UBUNTU-CVE-2018-1000548

Source
https://ubuntu.com/security/CVE-2018-1000548
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-1000548
Upstream
Published
2018-06-26T16:29:00Z
Modified
2026-01-20T16:50:32.105950Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Umlet version < 14.3 contains a XML External Entity (XXE) vulnerability in File parsing that can result in disclosure of confidential data, denial of service, server side request forgery. This attack appear to be exploitable via Specially crafted UXF file. This vulnerability appears to have been fixed in 14.3.

References

Affected packages

Ubuntu:16.04:LTS / umlet

Package

Name
umlet
Purl
pkg:deb/ubuntu/umlet@13.3-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

13.*
13.3-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "umlet",
            "binary_version": "13.3-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"

Ubuntu:18.04:LTS / umlet

Package

Name
umlet
Purl
pkg:deb/ubuntu/umlet@13.3-1.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

13.*
13.3-1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "umlet",
            "binary_version": "13.3-1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"

Ubuntu:20.04:LTS / umlet

Package

Name
umlet
Purl
pkg:deb/ubuntu/umlet@13.3-1.3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

13.*
13.3-1.2
13.3-1.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "umlet",
            "binary_version": "13.3-1.3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"

Ubuntu:22.04:LTS / umlet

Package

Name
umlet
Purl
pkg:deb/ubuntu/umlet@13.3-1.3?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

13.*
13.3-1.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "umlet",
            "binary_version": "13.3-1.3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"

Ubuntu:25.10 / umlet

Package

Name
umlet
Purl
pkg:deb/ubuntu/umlet@15.1+ds-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
15.1+ds-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "umlet",
            "binary_version": "15.1+ds-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"