| Vulnerability Name: | CCN-260681 | ||||||
| Published: | 2023-07-11 | ||||||
| Updated: | 2023-07-11 | ||||||
| Summary: | Eclipse Jetty is vulnerable to an XML external entity injection (XXE) attack when processing XML data, caused by a weakly configured XML parser. By using specially crafted XML content, a local authenticated attacker could exploit this vulnerability to read arbitrary files, cause a denial of service, conduct an SSRF attack, or achieve other system impacts. | ||||||
| CVSS v3 Severity: | 3.9 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L) 3.4 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||
| CVSS v2 Severity: | 3.5 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:P/I:P/A:P)
| ||||||
| Vulnerability Consequences: | Gain Access | ||||||
| References: | Source: CCN Type: Eclipse Web site Eclipse Jetty Source: XF Type: UNKNOWN eclipse-jetty-xxe(260681) Source: CCN Type: Eclipse GIT Repository Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations Source: CCN Type: Jetty GIT Repository Issue #10066 - Allow customization of SAXParserFactory and SAXParser in XmlParser #10067 | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||