The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
References
Link | Resource |
---|---|
https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E | Mailing List Vendor Advisory |
https://seclists.org/bugtraq/2019/Dec/11 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html | Exploit Third Party Advisory |
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E |
Configurations
Information
Published : 2019-12-04 09:16
Updated : 2020-01-31 01:15
NVD link : CVE-2019-17554
Mitre link : CVE-2019-17554
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
apache
- olingo