The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
References
Link | Resource |
---|---|
https://github.com/kbrw/sweet_xml/issues/71 | Exploit Third Party Advisory |
https://hex.pm/packages/sweet_xml | Third Party Advisory |
Configurations
Information
Published : 2019-08-18 23:15
Updated : 2021-07-21 04:39
NVD link : CVE-2019-15160
Mitre link : CVE-2019-15160
JSON object : View
CWE
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
Products Affected
kbrw
- sweet_xml