CVE-2020-36641

A vulnerability classified as problematic was found in gturri aXMLRPC up to 1.12.0. This vulnerability affects the function ResponseParser of the file src/main/java/de/timroes/axmlrpc/ResponseParser.java. The manipulation leads to xml external entity reference. Upgrading to version 1.12.1 is able to address this issue. The name of the patch is ad6615b3ec41353e614f6ea5fdd5b046442a832b. It is recommended to upgrade the affected component. VDB-217450 is the identifier assigned to this vulnerability.
References
Link Resource
https://github.com/gturri/aXMLRPC/releases/tag/aXMLRPC-1.12.1 Third Party Advisory
https://github.com/gturri/aXMLRPC/commit/ad6615b3ec41353e614f6ea5fdd5b046442a832b Patch Third Party Advisory
https://vuldb.com/?ctiid.217450 Permissions Required Third Party Advisory
https://vuldb.com/?id.217450 Permissions Required Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:axmlrpc_project:axmlrpc:*:*:*:*:*:*:*:*

Information

Published : 2023-01-05 04:15

Updated : 2023-01-11 11:33


NVD link : CVE-2020-36641

Mitre link : CVE-2020-36641


JSON object : View

CWE
CWE-611

Improper Restriction of XML External Entity Reference

Advertisement

dedicated server usa

Products Affected

axmlrpc_project

  • axmlrpc