A vulnerability classified as problematic was found in gturri aXMLRPC up to 1.12.0. This vulnerability affects the function ResponseParser of the file src/main/java/de/timroes/axmlrpc/ResponseParser.java. The manipulation leads to xml external entity reference. Upgrading to version 1.12.1 is able to address this issue. The name of the patch is ad6615b3ec41353e614f6ea5fdd5b046442a832b. It is recommended to upgrade the affected component. VDB-217450 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/gturri/aXMLRPC/releases/tag/aXMLRPC-1.12.1 | Third Party Advisory |
https://github.com/gturri/aXMLRPC/commit/ad6615b3ec41353e614f6ea5fdd5b046442a832b | Patch Third Party Advisory |
https://vuldb.com/?ctiid.217450 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.217450 | Permissions Required Third Party Advisory |
Configurations
Information
Published : 2023-01-05 04:15
Updated : 2023-01-11 11:33
NVD link : CVE-2020-36641
Mitre link : CVE-2020-36641
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
axmlrpc_project
- axmlrpc