dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2020-05-01 12:15
Updated : 2022-07-25 11:15
NVD link : CVE-2020-10683
Mitre link : CVE-2020-10683
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
oracle
- insurance_policy_administration_j2ee
- retail_integration_bus
- primavera_p6_enterprise_project_portfolio_management
- retail_order_broker
- health_sciences_information_manager
- communications_application_session_controller
- application_testing_suite
- storagetek_tape_analytics_sw_tool
- retail_price_management
- communications_diameter_signaling_router
- communications_unified_inventory_management
- financial_services_analytical_applications_infrastructure
- documaker
- rapid_planning
- enterprise_manager_base_platform
- health_sciences_empirica_signal
- jdeveloper
- business_process_management_suite
- flexcube_core_banking
- banking_platform
- utilities_framework
- agile_plm
- retail_xstore_point_of_service
- enterprise_data_quality
- fusion_middleware
- webcenter_portal
- retail_customer_management_and_segmentation_foundation
- data_integrator
- insurance_rules_palette
- endeca_information_discovery_integrator
canonical
- ubuntu_linux
netapp
- snapmanager
- oncommand_workflow_automation
- snapcenter
- snap_creator_framework
- oncommand_api_services
dom4j_project
- dom4j
opensuse
- leap