|
|||
Rule General Information |
---|
Release Date: | 2020-09-15 | |
Rule Name: | Apache Cocoon XML External Entity Vulnerability (CVE-2020-11991) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-11991 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E |