Vulnerability Name: | CVE-2021-37714 (CCN-207858) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-08-17 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-08-17 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-12-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | jsoup is vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted input, a remote attacker could exploit this vulnerability to cause the HTML and XML parser to get stuck, timeout, or throw unchecked exceptions resulting in a denial of service condition. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-37714 Source: XF Type: UNKNOWN jsoup-cve202137714-dos(207858) Source: CCN Type: jsoup GIT Repository Crafted input may cause the jsoup HTML and XML parser to get stuck, timeout, or throw unchecked exceptions Source: security-advisories@github.com Type: Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Release Notes, Vendor Advisory security-advisories@github.com Source: security-advisories@github.com Type: Release Notes, Vendor Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Third Party Advisory security-advisories@github.com Source: CCN Type: IBM Security Bulletin 6492219 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in jsoup Source: CCN Type: IBM Security Bulletin 6519468 (Curam Social Program Management) Vulnerability in jsoup may affect Curam Social Program Management (CVE-2021-37714) Source: CCN Type: IBM Security Bulletin 6523988 (BPM Process Designer) A CVE-2021-37714 vulnerability in jsoup affects IBM Process Designer in IBM Business Automation Workflow and IBM Business Process Manager Source: CCN Type: IBM Security Bulletin 6551876 (Cloud Pak for Security) Cloud Pak for Security uses packages that are vulnerable to multiple CVEs Source: CCN Type: IBM Security Bulletin 6570915 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities including a remote code execution in Spring Framework (CVE-2022-22965) Source: CCN Type: IBM Security Bulletin 6570957 (Cognos Analytics) IBM Cognos Analytics has addressed multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6573003 (Security Guardium) IBM Security Guardium is affected by a jsoup vulnerability (CVE-2021-37714) Source: CCN Type: Oracle CPUApr2022 Oracle Critical Patch Update Advisory - April 2022 Source: security-advisories@github.com Type: Patch, Third Party Advisory security-advisories@github.com Source: CCN Type: Oracle CPUJan2022 Oracle Critical Patch Update Advisory - January 2022 Source: security-advisories@github.com Type: Patch, Third Party Advisory security-advisories@github.com Source: CCN Type: Oracle CPUJul2022 Oracle Critical Patch Update Advisory - July 2022 Source: security-advisories@github.com Type: Patch, Third Party Advisory security-advisories@github.com | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |