CVE-2017-12621

During Jelly (xml) file parsing with Apache Xerces, if a custom doctype entity is declared with a "SYSTEM" entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lead to XML External Entity (XXE) attacks in Apache Commons Jelly before 1.0.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:commons_jelly:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:38

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/f1fc3f2c45264af44ce782d54b5908ac95f02bf7ad88bb57bfb04b73@%3Cdev.commons.apache.org%3E', 'name': '[dev] 20170927 [SECURITY] CVE-2017-12621 Apache Commons Jelly connects to URL with custom doctype definitions.', 'tags': ['Issue Tracking', 'Patch', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/f1fc3f2c45264af44ce782d54b5908ac95f02bf7ad88bb57bfb04b73%40%3Cdev.commons.apache.org%3E -

09 Feb 2023, 16:14

Type Values Removed Values Added
First Time Apache commons Jelly
References (CONFIRM) https://issues.apache.org/jira/browse/JELLY-293 - Issue Tracking, Patch, Vendor Advisory (CONFIRM) https://issues.apache.org/jira/browse/JELLY-293 - Issue Tracking, Vendor Advisory, Patch
CPE cpe:2.3:a:apache:commons-jelly:*:rc6:*:*:*:*:*:* cpe:2.3:a:apache:commons_jelly:*:*:*:*:*:*:*:*

Information

Published : 2017-09-28 01:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-12621

Mitre link : CVE-2017-12621

CVE.ORG link : CVE-2017-12621


JSON object : View

Products Affected

apache

  • commons_jelly
CWE
CWE-611

Improper Restriction of XML External Entity Reference