Vulnerability Name:

CVE-2014-3004 (CCN-93519)

Assigned:2014-05-27
Published:2014-05-27
Updated:2021-10-20
Summary:The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.4 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-611
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: Castor Web site
The Castor Project

Source: MITRE
Type: CNA
CVE-2014-3004

Source: SUSE
Type: Third Party Advisory
openSUSE-SU-2014:0822

Source: MISC
Type: Exploit
http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html

Source: CCN
Type: Full Disclosure Mailing List: Tue 27 May 2014
CVE-2014-3004 - Castor Library Default Config could lead to XML External Entity (XXE) Attacks

Source: FULLDISC
Type: Exploit
20140527 CVE-2014-3004 - Castor Library Default Config could lead to XML External Entity (XXE) Attacks

Source: SECUNIA
Type: UNKNOWN
59427

Source: CCN
Type: IBM Security Bulletin 1690567
XML External Entity Processing in Castor might affect WebSphere Lombardi Edition (CVE-2014-3004)

Source: CCN
Type: IBM Security Bulletin 1691332
Multiple IBM InfoSphere Information Server components are vulnerable due to the following Castor Library vulnerability (CVE-2014-3004)

Source: CCN
Type: IBM Security Bulletin 1694836
Vulnerability in Castor library affects Sterling Secure Proxy (CVE-2014-3004)

Source: CCN
Type: IBM Security Bulletin 1698242
IBM Connections Security Update for CVE-2014-3004

Source: CCN
Type: IBM Security Bulletin 1701178
Vulnerability in Castor library affects IBM Cram(CVE-2014-3004)

Source: CCN
Type: IBM Security Bulletin 1959291
Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1959294
Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1959298
Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server uses an insecure hashing scheme for handling user passwords (CVE-2015-1913)

Source: CCN
Type: IBM Security Bulletin 1960149
Rational Build Forge affected by Apache Tomcat vulnerability (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1961729
ulnerability in Diffie-Hellman key exchange protocol affects Rational Integration Tester component in Rational Test Workbench, and Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server

Source: CCN
Type: OSVDB ID: 107454
Castor Library XML External Entity (XXE) Injection Remote File Disclosure

Source: BID
Type: Broken Link
67676

Source: CCN
Type: BID-67676
Castor Library CVE-2014-3004 XML External Entity Information Disclosure Vulnerability

Source: XF
Type: UNKNOWN
castor-cve20143004-info-disc(93519)

Source: MISC
Type: UNKNOWN
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811

Source: CCN
Type: IBM Security Bulletin 6469891 (Control Center)
Castor Vulnerability Affects IBM Control Center (CVE-2014-3004)

Source: CCN
Type: IBM Security Bulletin 6486941 (Security Identity Manager)
Security vulnerabilitiy has been fixed in IBM Security Identity Manager (93519)

Source: CCN
Type: IBM Security Bulletin 6520510 (Cognos Analytics)
IBM Cognos Analytics has addressed multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6832732 (Cloud Pak for Automation)
Multiple security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for October 2022

Source: CCN
Type: IBM Security Bulletin 6834146 (Business Automation Workflow containers)
XML External Entity Injection vulnerability affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) - CVE-2014-3004

Source: CCN
Type: IBM Security Bulletin 6982841 (Netcool Operations Insight)
Netcool Operations Insight v1.6.8 addresses multiple security vulnerabilities.

Source: CCN
Type: IBM Security Bulletin 7003861 (Tivoli Application Dependency Discovery Manager)
TADDM is vulnerable to a denial of service due to vulnerability in Castor Library

Source: CCN
Type: Oracle CPUJan2020
Oracle Critical Patch Update Advisory - January 2020

Source: MISC
Type: UNKNOWN
https://www.oracle.com/security-alerts/cpujan2020.html

Source: MISC
Type: UNKNOWN
https://www.oracle.com/security-alerts/cpuoct2021.html

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-3004

Vulnerable Configuration:Configuration 1:
  • cpe:/a:castor_project:castor:*:*:*:*:*:*:*:* (Version <= 1.3.2)
  • OR cpe:/a:castor_project:castor:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:castor_project:castor:1.3:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:connections:4.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_secure_proxy:3.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere:7.2::~~lombardi~~~:*:*:*:*:*
  • OR cpe:/a:ibm:connections:3.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:connections:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_secure_proxy:3.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_secure_proxy:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:connections:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere:7.2.0.1::~~lombardi~~~:*:*:*:*:*
  • OR cpe:/a:ibm:websphere:7.2.0.2::~~lombardi~~~:*:*:*:*:*
  • OR cpe:/a:ibm:websphere:7.2.0.3::~~lombardi~~~:*:*:*:*:*
  • OR cpe:/a:ibm:websphere:7.2.0.4::~~lombardi~~~:*:*:*:*:*
  • OR cpe:/a:ibm:websphere:7.2.0.5::~~lombardi~~~:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_secure_proxy:3.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:curam_social_program_management:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:curam_social_program_management:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:curam_social_program_management:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:curam_social_program_management:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:curam_social_program_management:4.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:curam_social_program_management:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_manager:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:19.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_manager:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:20.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:20.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:control_center:6.2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:20.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:21.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:21.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:19.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:-:*:*:containers:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:*:*:*:traditional:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:*:*:*:traditional:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.1:*:*:*:traditional:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:-:*:*:containers:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:19.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.2:-:*:*:containers:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:22.0.1:-:*:*:containers:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:22.0.1:*:*:*:traditional:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.3.1:*:*:*:traditional:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20143004
    V
    CVE-2014-3004
    2022-06-30
    oval:org.opensuse.security:def:112050
    P
    castor-0.9.5-326.4 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105602
    P
    castor-0.9.5-326.4 on GA media (Moderate)
    2021-10-01
    oval:com.ubuntu.cosmic:def:201430040000000
    V
    CVE-2014-3004 on Ubuntu 18.10 (cosmic) - medium.
    2014-06-11
    oval:com.ubuntu.artful:def:20143004000
    V
    CVE-2014-3004 on Ubuntu 17.10 (artful) - medium.
    2014-06-11
    oval:com.ubuntu.trusty:def:20143004000
    V
    CVE-2014-3004 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-06-11
    oval:com.ubuntu.bionic:def:201430040000000
    V
    CVE-2014-3004 on Ubuntu 18.04 LTS (bionic) - medium.
    2014-06-11
    oval:com.ubuntu.bionic:def:20143004000
    V
    CVE-2014-3004 on Ubuntu 18.04 LTS (bionic) - medium.
    2014-06-11
    oval:com.ubuntu.xenial:def:20143004000
    V
    CVE-2014-3004 on Ubuntu 16.04 LTS (xenial) - medium.
    2014-06-11
    oval:com.ubuntu.xenial:def:201430040000000
    V
    CVE-2014-3004 on Ubuntu 16.04 LTS (xenial) - medium.
    2014-06-11
    oval:com.ubuntu.cosmic:def:20143004000
    V
    CVE-2014-3004 on Ubuntu 18.10 (cosmic) - medium.
    2014-06-11
    oval:com.ubuntu.disco:def:201430040000000
    V
    CVE-2014-3004 on Ubuntu 19.04 (disco) - medium.
    2014-06-11
    oval:com.ubuntu.precise:def:20143004000
    V
    CVE-2014-3004 on Ubuntu 12.04 LTS (precise) - medium.
    2014-06-11
    BACK
    castor_project castor *
    castor_project castor 1.3.1
    castor_project castor 1.3
    opensuse_project opensuse 12.3
    opensuse opensuse 13.1
    ibm infosphere information server 8.5
    ibm infosphere information server 8.7
    ibm infosphere information server 9.1
    ibm connections 4.5
    ibm sterling secure proxy 3.4.1
    ibm rational build forge 8.0
    ibm websphere 7.2
    ibm connections 3.0.1.1
    ibm connections 4.0
    ibm rational build forge 8.0.0.1
    ibm rational build forge 8.0.0.2
    ibm sterling secure proxy 3.4
    ibm rational build forge 7.1.3
    ibm rational build forge 7.1.3.1
    ibm rational build forge 7.1.3.2
    ibm rational build forge 7.1.3.3
    ibm rational build forge 7.1.3.4
    ibm rational build forge 7.1.3.5
    ibm sterling secure proxy 3.3.1
    ibm connections 5.0
    ibm websphere 7.2.0.1
    ibm websphere 7.2.0.2
    ibm websphere 7.2.0.3
    ibm websphere 7.2.0.4
    ibm websphere 7.2.0.5
    ibm rational build forge 7.1.2
    ibm rational build forge 7.1.2.1
    ibm rational build forge 7.1.2.2
    ibm rational build forge 7.1.2.3
    ibm rational test workbench 8.0
    ibm rational test workbench 8.0.0.1
    ibm rational test workbench 8.0.0.2
    ibm rational test workbench 8.0.0.3
    ibm rational test workbench 8.0.1
    ibm rational test workbench 8.0.1.1
    ibm rational test workbench 8.0.1.2
    ibm rational test workbench 8.0.1.3
    ibm rational test workbench 8.0.1.4
    ibm rational test workbench 8.5
    ibm rational test workbench 8.5.0.1
    ibm rational test workbench 8.5.0.2
    ibm rational build forge 7.1.3.6
    ibm infosphere information server 11.3.1.0
    ibm sterling secure proxy 3.4.2
    ibm curam social program management 6.0.4
    ibm curam social program management 6.0.5
    ibm curam social program management 6.0
    ibm curam social program management 5.2
    ibm curam social program management 4.5
    ibm curam social program management 6.0.3
    ibm rational test workbench 8.6
    ibm rational test workbench 8.7
    ibm rational test workbench 8.0.0.4
    ibm rational test workbench 8.0.1.5
    ibm rational test workbench 8.5.0.3
    ibm rational test workbench 8.5.1
    ibm rational test workbench 8.5.1.1
    ibm rational test workbench 8.5.1.2
    ibm rational test workbench 8.5.1.3
    ibm rational test workbench 8.5.1.4
    ibm rational test workbench 8.6.0.1
    ibm rational test workbench 8.6.0.2
    ibm rational test workbench 8.6.0.3
    ibm rational test workbench 8.7.0.1
    ibm rational test workbench 8.0.0.5
    ibm rational test workbench 8.0.1.6
    ibm rational test workbench 8.5.0.4
    ibm rational test workbench 8.5.1.5
    ibm rational test workbench 8.6.0.4
    ibm rational test workbench 8.7.0.2
    ibm business process manager 8.6.0.0
    oracle utilities framework 4.3.0
    ibm security identity manager 6.0.0
    ibm cloud pak for automation 19.0.3
    ibm business process manager 8.5.0.0
    ibm tivoli application dependency discovery manager 7.3.0.0
    ibm security identity manager 6.0.2
    ibm cloud pak for automation 20.0.1
    ibm cloud pak for automation 20.0.2
    ibm control center 6.2.0.0
    ibm cloud pak for automation 20.0.3
    ibm cloud pak for automation 21.0.1
    ibm cloud pak for automation 21.0.2 -
    ibm cognos analytics 11.2.0
    ibm cognos analytics 11.1.7
    ibm cloud pak for automation 19.0.1
    ibm business automation workflow 20.0.0.1 -
    ibm business automation workflow 20.0.0.1
    ibm business automation workflow 20.0.0.2
    ibm business automation workflow 21.0.1
    ibm business automation workflow 20.0.0.2 -
    ibm business automation workflow 21.0.3 -
    ibm cloud pak for automation 19.0.2
    ibm business automation workflow 21.0.2 -
    ibm business automation workflow 22.0.1 -
    ibm business automation workflow 22.0.1
    ibm business automation workflow 21.0.3.1