Vulnerabilites related to apache - poi
CVE-2022-26336 (GCVE-0-2022-26336)
Vulnerability from cvelistv5
Published
2022-03-04 00:00
Modified
2024-08-03 05:03
Severity ?
EPSS score ?
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | poi-scratchpad |
Version: unspecified < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:03:32.643Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20221028-0006/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "poi-scratchpad", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "5.2.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Apache POI would like to thank Craig Haft of Yahoo Inc. for reporting and providing a patch for this issue.", }, ], descriptions: [ { lang: "en", value: "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.", }, ], metrics: [ { other: { content: { other: "moderate", }, type: "unknown", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-770", description: "CWE-770 Allocation of Resources Without Limits or Throttling", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-28T00:00:00", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j", }, { url: "https://security.netapp.com/advisory/ntap-20221028-0006/", }, ], source: { defect: [ "https://bz.apache.org/bugzilla/show_bug.cgi?id=65899", ], discovery: "UNKNOWN", }, title: "A carefully crafted TNEF file can cause an out of memory exception", x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2022-26336", datePublished: "2022-03-04T00:00:00", dateReserved: "2022-03-01T00:00:00", dateUpdated: "2024-08-03T05:03:32.643Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2014-3529 (GCVE-0-2014-3529)
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:50:16.343Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://poi.apache.org/changes.html", }, { name: "78018", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/78018", }, { name: "61766", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61766", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { name: "apache-poi-cve20143529-info-disc(95770)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770", }, { name: "RHSA-2014:1370", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { name: "60419", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60419", }, { name: "RHSA-2014:1400", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { name: "69647", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69647", }, { name: "RHSA-2014:1398", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { name: "59943", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59943", }, { name: "RHSA-2014:1399", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-04T00:00:00", descriptions: [ { lang: "en", value: "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://poi.apache.org/changes.html", }, { name: "78018", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/78018", }, { name: "61766", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61766", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { name: "apache-poi-cve20143529-info-disc(95770)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770", }, { name: "RHSA-2014:1370", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { name: "60419", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60419", }, { name: "RHSA-2014:1400", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { name: "69647", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69647", }, { name: "RHSA-2014:1398", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { name: "59943", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59943", }, { name: "RHSA-2014:1399", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3529", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "http://poi.apache.org/changes.html", refsource: "CONFIRM", url: "http://poi.apache.org/changes.html", }, { name: "78018", refsource: "BID", url: "http://www.securityfocus.com/bid/78018", }, { name: "61766", refsource: "SECUNIA", url: "http://secunia.com/advisories/61766", }, { name: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", refsource: "CONFIRM", url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { name: "apache-poi-cve20143529-info-disc(95770)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770", }, { name: "RHSA-2014:1370", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { name: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", refsource: "CONFIRM", url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { name: "60419", refsource: "SECUNIA", url: "http://secunia.com/advisories/60419", }, { name: "RHSA-2014:1400", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { name: "69647", refsource: "BID", url: "http://www.securityfocus.com/bid/69647", }, { name: "RHSA-2014:1398", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { name: "59943", refsource: "SECUNIA", url: "http://secunia.com/advisories/59943", }, { name: "RHSA-2014:1399", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3529", datePublished: "2014-09-04T17:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:50:16.343Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-12626 (GCVE-0-2017-12626)
Vulnerability from cvelistv5
Published
2018-01-29 17:00
Modified
2024-09-16 18:45
Severity ?
EPSS score ?
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:1322 | vendor-advisory, x_refsource_REDHAT | |
https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/102879 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpuapr2020.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpujul2020.html | x_refsource_MISC | |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpujan2020.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpuoct2020.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpujan2021.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpuApr2021.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache POI |
Version: < 3.17 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:43:56.421Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:1322", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:1322", }, { name: "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI < 3.17", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E", }, { name: "102879", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/102879", }, { name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache POI", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "< 3.17", }, ], }, ], datePublic: "2018-01-26T00:00:00", descriptions: [ { lang: "en", value: "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service Vulnerabilities", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-14T17:20:03", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "RHSA-2018:1322", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:1322", }, { name: "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI < 3.17", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E", }, { name: "102879", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/102879", }, { name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-01-26T00:00:00", ID: "CVE-2017-12626", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache POI", version: { version_data: [ { version_value: "< 3.17", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service Vulnerabilities", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:1322", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1322", }, { name: "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI < 3.17", refsource: "MLIST", url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E", }, { name: "102879", refsource: "BID", url: "http://www.securityfocus.com/bid/102879", }, { name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", refsource: "MLIST", url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E", }, { name: "https://www.oracle.com/security-alerts/cpuapr2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { name: "https://www.oracle.com/security-alerts/cpujan2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { name: "https://www.oracle.com/security-alerts/cpuoct2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { name: "https://www.oracle.com/security-alerts/cpujan2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { name: "https://www.oracle.com/security-alerts/cpuApr2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2017-12626", datePublished: "2018-01-29T17:00:00Z", dateReserved: "2017-08-07T00:00:00", dateUpdated: "2024-09-16T18:45:21.181Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-5644 (GCVE-0-2017-5644)
Vulnerability from cvelistv5
Published
2017-03-24 14:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/96983 | vdb-entry, x_refsource_BID | |
https://www.oracle.com/security-alerts/cpuoct2020.html | x_refsource_MISC | |
http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache POI |
Version: before 3.15 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:47.262Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "96983", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/96983", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache POI", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "before 3.15", }, ], }, ], datePublic: "2017-03-20T00:00:00", descriptions: [ { lang: "en", value: "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.", }, ], problemTypes: [ { descriptions: [ { description: "XXE", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-20T21:14:51", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "96983", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/96983", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2017-5644", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache POI", version: { version_data: [ { version_value: "before 3.15", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "XXE", }, ], }, ], }, references: { reference_data: [ { name: "96983", refsource: "BID", url: "http://www.securityfocus.com/bid/96983", }, { name: "https://www.oracle.com/security-alerts/cpuoct2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { name: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", refsource: "CONFIRM", url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2017-5644", datePublished: "2017-03-24T14:00:00", dateReserved: "2017-01-29T00:00:00", dateUpdated: "2024-08-05T15:11:47.262Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2012-0213 (GCVE-0-2012-0213)
Vulnerability from cvelistv5
Published
2012-08-07 21:00
Modified
2024-08-06 18:16
Severity ?
EPSS score ?
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | x_refsource_CONFIRM | |
http://secunia.com/advisories/49040 | third-party-advisory, x_refsource_SECUNIA | |
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2468 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/50549 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/53487 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2012-1232.html | vendor-advisory, x_refsource_REDHAT | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:094 | vendor-advisory, x_refsource_MANDRIVA | |
https://bugzilla.redhat.com/show_bug.cgi?id=799078 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T18:16:19.382Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "49040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/49040", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", }, { name: "DSA-2468", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2012/dsa-2468", }, { name: "50549", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/50549", }, { name: "FEDORA-2012-10835", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html", }, { name: "53487", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/53487", }, { name: "RHSA-2012:1232", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html", }, { name: "MDVSA-2013:094", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2012-05-09T00:00:00", descriptions: [ { lang: "en", value: "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-02-10T21:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "49040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/49040", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", }, { name: "DSA-2468", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2012/dsa-2468", }, { name: "50549", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/50549", }, { name: "FEDORA-2012-10835", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html", }, { name: "53487", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/53487", }, { name: "RHSA-2012:1232", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html", }, { name: "MDVSA-2013:094", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2012-0213", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "49040", refsource: "SECUNIA", url: "http://secunia.com/advisories/49040", }, { name: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", refsource: "CONFIRM", url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", }, { name: "DSA-2468", refsource: "DEBIAN", url: "http://www.debian.org/security/2012/dsa-2468", }, { name: "50549", refsource: "SECUNIA", url: "http://secunia.com/advisories/50549", }, { name: "FEDORA-2012-10835", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html", }, { name: "53487", refsource: "BID", url: "http://www.securityfocus.com/bid/53487", }, { name: "RHSA-2012:1232", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html", }, { name: "MDVSA-2013:094", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=799078", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2012-0213", datePublished: "2012-08-07T21:00:00", dateReserved: "2011-12-14T00:00:00", dateUpdated: "2024-08-06T18:16:19.382Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2014-3574 (GCVE-0-2014-3574)
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:50:17.790Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "69648", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69648", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://poi.apache.org/changes.html", }, { name: "61766", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61766", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { name: "RHSA-2014:1370", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { name: "60419", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60419", }, { name: "apache-poi-cve20143574-dos(95768)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768", }, { name: "RHSA-2014:1400", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { name: "RHSA-2014:1398", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { name: "59943", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59943", }, { name: "RHSA-2014:1399", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-18T00:00:00", descriptions: [ { lang: "en", value: "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "69648", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69648", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://poi.apache.org/changes.html", }, { name: "61766", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61766", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { name: "RHSA-2014:1370", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { name: "60419", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60419", }, { name: "apache-poi-cve20143574-dos(95768)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768", }, { name: "RHSA-2014:1400", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { name: "RHSA-2014:1398", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { name: "59943", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59943", }, { name: "RHSA-2014:1399", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3574", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "69648", refsource: "BID", url: "http://www.securityfocus.com/bid/69648", }, { name: "http://poi.apache.org/changes.html", refsource: "CONFIRM", url: "http://poi.apache.org/changes.html", }, { name: "61766", refsource: "SECUNIA", url: "http://secunia.com/advisories/61766", }, { name: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", refsource: "CONFIRM", url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { name: "RHSA-2014:1370", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { name: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", refsource: "CONFIRM", url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { name: "60419", refsource: "SECUNIA", url: "http://secunia.com/advisories/60419", }, { name: "apache-poi-cve20143574-dos(95768)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768", }, { name: "RHSA-2014:1400", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { name: "RHSA-2014:1398", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { name: "59943", refsource: "SECUNIA", url: "http://secunia.com/advisories/59943", }, { name: "RHSA-2014:1399", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3574", datePublished: "2014-09-04T17:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:50:17.790Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-12415 (GCVE-0-2019-12415)
Vulnerability from cvelistv5
Published
2019-10-23 19:27
Modified
2024-08-04 23:17
Severity ?
EPSS score ?
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Apache POI |
Version: Apache POI up to 4.1.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:17:40.071Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E", }, { name: "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E", }, { name: "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E", }, { name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache POI", vendor: "n/a", versions: [ { status: "affected", version: "Apache POI up to 4.1.0", }, ], }, ], descriptions: [ { lang: "en", value: "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-20T10:38:23", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E", }, { name: "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E", }, { name: "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E", }, { name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2019-12415", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache POI", version: { version_data: [ { version_value: "Apache POI up to 4.1.0", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", refsource: "MLIST", url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E", }, { name: "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", refsource: "MLIST", url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E", }, { name: "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", refsource: "MLIST", url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E", }, { name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E", }, { name: "https://www.oracle.com/security-alerts/cpuapr2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "https://www.oracle.com/security-alerts/cpujan2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { name: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E", refsource: "MISC", url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E", }, { name: "https://www.oracle.com/security-alerts/cpuoct2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { name: "https://www.oracle.com/security-alerts/cpujan2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { name: "https://www.oracle.com/security-alerts/cpuApr2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { name: "https://www.oracle.com//security-alerts/cpujul2021.html", refsource: "MISC", url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { name: "https://www.oracle.com/security-alerts/cpuoct2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2019-12415", datePublished: "2019-10-23T19:27:20", dateReserved: "2019-05-28T00:00:00", dateUpdated: "2024-08-04T23:17:40.071Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-5000 (GCVE-0-2016-5000)
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 00:46
Severity ?
EPSS score ?
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/538981/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/92100 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037741 | vdb-entry, x_refsource_SECTRACK | |
https://lists.apache.org/list.html?user%40poi.apache.org | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpuoct2020.html | x_refsource_MISC | |
http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:46:40.237Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded", }, { name: "92100", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/92100", }, { name: "1037741", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1037741", }, { name: "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/list.html?user%40poi.apache.org", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-07-22T00:00:00", descriptions: [ { lang: "en", value: "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-20T21:14:51", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded", }, { name: "92100", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/92100", }, { name: "1037741", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1037741", }, { name: "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/list.html?user%40poi.apache.org", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-5000", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded", }, { name: "92100", refsource: "BID", url: "http://www.securityfocus.com/bid/92100", }, { name: "1037741", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1037741", }, { name: "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example", refsource: "MLIST", url: "https://lists.apache.org/list.html?user@poi.apache.org", }, { name: "https://www.oracle.com/security-alerts/cpuoct2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-5000", datePublished: "2016-08-05T14:00:00", dateReserved: "2016-05-24T00:00:00", dateUpdated: "2024-08-06T00:46:40.237Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2014-9527 (GCVE-0-2014-9527)
Vulnerability from cvelistv5
Published
2015-01-06 15:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2016:1135 | vendor-advisory, x_refsource_REDHAT | |
http://poi.apache.org/changes.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/77726 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/61953 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html | vendor-advisory, x_refsource_FEDORA | |
https://issues.apache.org/bugzilla/show_bug.cgi?id=57272 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:47:41.391Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "RHSA-2016:1135", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1135", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://poi.apache.org/changes.html", }, { name: "77726", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/77726", }, { name: "61953", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61953", }, { name: "FEDORA-2015-2090", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-12-29T00:00:00", descriptions: [ { lang: "en", value: "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-02-10T21:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "RHSA-2016:1135", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1135", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://poi.apache.org/changes.html", }, { name: "77726", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/77726", }, { name: "61953", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61953", }, { name: "FEDORA-2015-2090", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9527", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { name: "RHSA-2016:1135", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1135", }, { name: "http://poi.apache.org/changes.html", refsource: "CONFIRM", url: "http://poi.apache.org/changes.html", }, { name: "77726", refsource: "BID", url: "http://www.securityfocus.com/bid/77726", }, { name: "61953", refsource: "SECUNIA", url: "http://secunia.com/advisories/61953", }, { name: "FEDORA-2015-2090", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html", }, { name: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", refsource: "CONFIRM", url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-9527", datePublished: "2015-01-06T15:00:00", dateReserved: "2015-01-06T00:00:00", dateUpdated: "2024-08-06T13:47:41.391Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2012-08-07 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
apache | poi | 0.1 | |
apache | poi | 0.2 | |
apache | poi | 0.3 | |
apache | poi | 0.4 | |
apache | poi | 0.5 | |
apache | poi | 0.6 | |
apache | poi | 0.7 | |
apache | poi | 0.10.0 | |
apache | poi | 0.11.0 | |
apache | poi | 0.12.0 | |
apache | poi | 0.13.0 | |
apache | poi | 0.14.0 | |
apache | poi | 1.0.0 | |
apache | poi | 1.0.1 | |
apache | poi | 1.0.2 | |
apache | poi | 1.1.0 | |
apache | poi | 1.2.0 | |
apache | poi | 1.5 | |
apache | poi | 1.5.1 | |
apache | poi | 1.7 | |
apache | poi | 1.8 | |
apache | poi | 1.10 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.5 | |
apache | poi | 2.5.1 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0.1 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.2 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.6 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "1CDF1F8B-7A6A-4938-A36C-02985A7299C9", versionEndIncluding: "3.8", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", matchCriteriaId: "BBE2279A-42D7-4FBE-A732-55950225E450", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", matchCriteriaId: "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", matchCriteriaId: "FEDD83D8-2668-4693-A7FB-48F09E1764F7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", matchCriteriaId: "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", matchCriteriaId: "AF5C9105-FC01-475F-9D89-6A91FBF2949F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", matchCriteriaId: "5C858F25-4858-41C6-9BCB-9665D21F265E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", matchCriteriaId: "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", matchCriteriaId: "6724EEA0-E884-4884-8097-7F833BE58AE5", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", matchCriteriaId: "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", matchCriteriaId: "81846632-36FF-4149-BCA0-C22B65F220A3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", matchCriteriaId: "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", matchCriteriaId: "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", matchCriteriaId: "148DF854-533C-48DF-ACF2-13A6A07D03EA", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B08B2CFF-6357-4830-B5F5-C335B4975E19", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "256470D1-508C-4B0E-B7A3-B2E6357D2372", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", matchCriteriaId: "57B95965-17EE-4BCF-BFC1-75FEC936F756", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "A135A468-8408-4396-8493-CF62C642F1B4", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", matchCriteriaId: "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", matchCriteriaId: "A2200AC8-A934-45FF-8C38-B4826CEB68E4", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", matchCriteriaId: "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", matchCriteriaId: "0395450F-5486-425C-B6BE-549F2CE24C13", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", matchCriteriaId: "EC948D61-A860-4E8E-975D-B19929AD27EA", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", matchCriteriaId: "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", matchCriteriaId: "602F0B28-D553-4F29-BFCB-7F4A409E40F7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", matchCriteriaId: "3202EBFB-B547-4BA2-8219-E00A86995D3F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", matchCriteriaId: "4466C398-24F7-442F-9327-94E52B73FA7B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", matchCriteriaId: "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "05CE5511-6C01-4E19-A351-88B7A944531D", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", matchCriteriaId: "80482643-A5E8-4585-BAD7-E30B40F2552E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "258A5FF1-C199-4775-9ACC-902D649E751E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "22591C38-3610-4910-ABE5-1574446F6650", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", matchCriteriaId: "4855870F-388F-4E72-A4F8-AAE61187A433", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", matchCriteriaId: "BD88A7B3-23BE-411E-9415-B47B5896FFD6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", matchCriteriaId: "E19E7943-2097-4C17-B344-948AB45CA308", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", matchCriteriaId: "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", matchCriteriaId: "45B1D735-DC16-4B1A-A21D-599E7F12651C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", matchCriteriaId: "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", matchCriteriaId: "F0004217-3B76-48B1-97F7-F0E548FBD6D6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", matchCriteriaId: "392805F3-3B33-4E20-8108-6ED62DFE7480", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", matchCriteriaId: "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", matchCriteriaId: "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", matchCriteriaId: "CB86DA57-CE46-4651-84E1-409F2375A997", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", matchCriteriaId: "53A87A07-867B-48A9-BC89-47844EF461C6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", matchCriteriaId: "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", matchCriteriaId: "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", matchCriteriaId: "DC7693A6-11AC-4BF9-9307-49D028F19885", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", matchCriteriaId: "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", matchCriteriaId: "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", matchCriteriaId: "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", matchCriteriaId: "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", matchCriteriaId: "E585E98A-EB9A-492F-8902-85D99AC8E554", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", matchCriteriaId: "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", matchCriteriaId: "258BC823-5828-44B4-AFF5-A7E49281FD10", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.", }, { lang: "es", value: "La función UnhandledDataStructure en hwpf/model/UnhandledDataStructure.java en Apache POI v3.8 y anteriores permite a atacantes remotos earlier provocar una denegación de servicio (excepción OutOfMemoryError y posiblemente desestabilización JVM) mediante un valor de longitud manipulado en un Channel Definition Format (CDF) o en un documento Compound File Binary Format (CFBF).", }, ], id: "CVE-2012-0213", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2012-08-07T21:55:01.093", references: [ { source: "security@debian.org", url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html", }, { source: "security@debian.org", url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html", }, { source: "security@debian.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/49040", }, { source: "security@debian.org", url: "http://secunia.com/advisories/50549", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "security@debian.org", url: "http://www.debian.org/security/2012/dsa-2468", }, { source: "security@debian.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094", }, { source: "security@debian.org", url: "http://www.securityfocus.com/bid/53487", }, { source: "security@debian.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078", }, { source: "security@debian.org", url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/49040", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/50549", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2012/dsa-2468", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/53487", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", }, ], sourceIdentifier: "security@debian.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F", versionEndIncluding: "3.10", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", matchCriteriaId: "BBE2279A-42D7-4FBE-A732-55950225E450", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", matchCriteriaId: "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", matchCriteriaId: "FEDD83D8-2668-4693-A7FB-48F09E1764F7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", matchCriteriaId: "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", matchCriteriaId: "AF5C9105-FC01-475F-9D89-6A91FBF2949F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", matchCriteriaId: "5C858F25-4858-41C6-9BCB-9665D21F265E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", matchCriteriaId: "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", matchCriteriaId: "6724EEA0-E884-4884-8097-7F833BE58AE5", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", matchCriteriaId: "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", matchCriteriaId: "81846632-36FF-4149-BCA0-C22B65F220A3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", matchCriteriaId: "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", matchCriteriaId: "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", matchCriteriaId: "148DF854-533C-48DF-ACF2-13A6A07D03EA", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B08B2CFF-6357-4830-B5F5-C335B4975E19", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "256470D1-508C-4B0E-B7A3-B2E6357D2372", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", matchCriteriaId: "57B95965-17EE-4BCF-BFC1-75FEC936F756", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "A135A468-8408-4396-8493-CF62C642F1B4", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", matchCriteriaId: "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", matchCriteriaId: "A2200AC8-A934-45FF-8C38-B4826CEB68E4", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", matchCriteriaId: "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", matchCriteriaId: "0395450F-5486-425C-B6BE-549F2CE24C13", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", matchCriteriaId: "EC948D61-A860-4E8E-975D-B19929AD27EA", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", matchCriteriaId: "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", matchCriteriaId: "602F0B28-D553-4F29-BFCB-7F4A409E40F7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", matchCriteriaId: "3202EBFB-B547-4BA2-8219-E00A86995D3F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", matchCriteriaId: "4466C398-24F7-442F-9327-94E52B73FA7B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", matchCriteriaId: "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "05CE5511-6C01-4E19-A351-88B7A944531D", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", matchCriteriaId: "80482643-A5E8-4585-BAD7-E30B40F2552E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "258A5FF1-C199-4775-9ACC-902D649E751E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "22591C38-3610-4910-ABE5-1574446F6650", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", matchCriteriaId: "4855870F-388F-4E72-A4F8-AAE61187A433", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", matchCriteriaId: "BD88A7B3-23BE-411E-9415-B47B5896FFD6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", matchCriteriaId: "E19E7943-2097-4C17-B344-948AB45CA308", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", matchCriteriaId: "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", matchCriteriaId: "45B1D735-DC16-4B1A-A21D-599E7F12651C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", matchCriteriaId: "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", matchCriteriaId: "F0004217-3B76-48B1-97F7-F0E548FBD6D6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", matchCriteriaId: "392805F3-3B33-4E20-8108-6ED62DFE7480", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", matchCriteriaId: "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", matchCriteriaId: "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", matchCriteriaId: "CB86DA57-CE46-4651-84E1-409F2375A997", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", matchCriteriaId: "53A87A07-867B-48A9-BC89-47844EF461C6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", matchCriteriaId: "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", matchCriteriaId: "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", matchCriteriaId: "DC7693A6-11AC-4BF9-9307-49D028F19885", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", matchCriteriaId: "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", matchCriteriaId: "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*", matchCriteriaId: "F1501370-BC00-4456-9A52-EE4E9899567A", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", matchCriteriaId: "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", matchCriteriaId: "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", matchCriteriaId: "E585E98A-EB9A-492F-8902-85D99AC8E554", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", matchCriteriaId: "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", matchCriteriaId: "258BC823-5828-44B4-AFF5-A7E49281FD10", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*", matchCriteriaId: "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*", matchCriteriaId: "DD7E734A-22C1-4895-AE1F-2EB87126EBA7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*", matchCriteriaId: "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", }, { lang: "es", value: "La configuración de OPC SAX en Apache POI anterior a 3.10.1 permite a atacantes remotos leer ficheros arbitrarios a través de un fichero OpenXML que contiene una declaración de entidad externa XML en conjunto con una referencia de entidad, relacionado con un problema de entidad externa XML (XXE).", }, ], evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>", id: "CVE-2014-3529", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-09-04T17:55:05.623", references: [ { source: "secalert@redhat.com", url: "http://poi.apache.org/changes.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/59943", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/60419", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/61766", }, { source: "secalert@redhat.com", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "secalert@redhat.com", url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/69647", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/78018", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://poi.apache.org/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/59943", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60419", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61766", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/69647", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/78018", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2015-01-06 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 20 | |
apache | poi | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", matchCriteriaId: "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:beta3:*:*:*:*:*:*", matchCriteriaId: "0E4D7997-8DE0-4D93-8C8C-E9D8EF6BC1F8", versionEndIncluding: "3.11", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.", }, { lang: "es", value: "HSLFSlideShow en Apache POI anterior a 3.11 permite a atacantes remotos causar una denegación de servicio (bucle infinito y bloqueo) a través de un fichero PPT manipulado.", }, ], id: "CVE-2014-9527", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-01-06T15:59:05.727", references: [ { source: "cve@mitre.org", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html", }, { source: "cve@mitre.org", url: "http://poi.apache.org/changes.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61953", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/77726", }, { source: "cve@mitre.org", url: "https://access.redhat.com/errata/RHSA-2016:1135", }, { source: "cve@mitre.org", url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://poi.apache.org/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61953", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/77726", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/errata/RHSA-2016:1135", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-04 16:15
Modified
2024-11-21 06:53
Severity ?
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j | Mailing List, Vendor Advisory | |
security@apache.org | https://security.netapp.com/advisory/ntap-20221028-0006/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221028-0006/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "A853FEC8-0927-4637-A352-BB91914AFFCD", versionEndExcluding: "5.2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", matchCriteriaId: "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", matchCriteriaId: "B55E8D50-99B4-47EC-86F9-699B67D473CE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.", }, { lang: "es", value: "Un fallo en el paquete HMEF de poi-scratchpad (Apache POI) permite a un atacante causar una excepción de Falta de Memoria. Este paquete es usado para leer archivos TNEF (Microsoft Outlook y Microsoft Exchange Server). Si una aplicación usa poi-scratchpad para analizar archivos TNEF y la aplicación permite que usuarios no confiables los suministren, entonces un archivo cuidadosamente diseñado puede causar una excepción de Falta de Memoria. Este problema afecta a versión 5.2.0 de poi-scratchpad y versiones anteriores. Es recomendado a usuarios actualizar a poi-scratchpad versión 5.2.1", }, ], id: "CVE-2022-26336", lastModified: "2024-11-21T06:53:46.477", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-04T16:15:10.923", references: [ { source: "security@apache.org", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221028-0006/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221028-0006/", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-770", }, ], source: "security@apache.org", type: "Primary", }, { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2018-01-29 17:29
Modified
2024-11-21 03:09
Severity ?
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "1C04149C-A260-4129-93DE-EA5815189C17", versionEndExcluding: "3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).", }, { lang: "es", value: "Apache POI, en versiones anteriores al release 3.17, es vulnerable a ataques de denegación de servicio (DoS): 1) bucles infinitos al analizar WMF, EMF, MSG y macros manipuladas (POI bugs 61338 y 61294); y 2) excepciones fuera de memoria al analizar DOC, PPT y XLS manipulados(POI bugs 52372 y 61295).", }, ], id: "CVE-2017-12626", lastModified: "2024-11-21T03:09:55.420", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-01-29T17:29:00.410", references: [ { source: "security@apache.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102879", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1322", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E", }, { source: "security@apache.org", url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { source: "security@apache.org", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { source: "security@apache.org", url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { source: "security@apache.org", url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { source: "security@apache.org", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "security@apache.org", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { source: "security@apache.org", url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102879", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1322", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-835", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F", versionEndIncluding: "3.10", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", matchCriteriaId: "BBE2279A-42D7-4FBE-A732-55950225E450", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", matchCriteriaId: "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", matchCriteriaId: "FEDD83D8-2668-4693-A7FB-48F09E1764F7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", matchCriteriaId: "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", matchCriteriaId: "AF5C9105-FC01-475F-9D89-6A91FBF2949F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", matchCriteriaId: "5C858F25-4858-41C6-9BCB-9665D21F265E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", matchCriteriaId: "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", matchCriteriaId: "6724EEA0-E884-4884-8097-7F833BE58AE5", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", matchCriteriaId: "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", matchCriteriaId: "81846632-36FF-4149-BCA0-C22B65F220A3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", matchCriteriaId: "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", matchCriteriaId: "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", matchCriteriaId: "148DF854-533C-48DF-ACF2-13A6A07D03EA", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "B08B2CFF-6357-4830-B5F5-C335B4975E19", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "256470D1-508C-4B0E-B7A3-B2E6357D2372", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", matchCriteriaId: "57B95965-17EE-4BCF-BFC1-75FEC936F756", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "A135A468-8408-4396-8493-CF62C642F1B4", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", matchCriteriaId: "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", matchCriteriaId: "A2200AC8-A934-45FF-8C38-B4826CEB68E4", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", matchCriteriaId: "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", matchCriteriaId: "0395450F-5486-425C-B6BE-549F2CE24C13", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", matchCriteriaId: "EC948D61-A860-4E8E-975D-B19929AD27EA", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", matchCriteriaId: "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", matchCriteriaId: "602F0B28-D553-4F29-BFCB-7F4A409E40F7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", matchCriteriaId: "3202EBFB-B547-4BA2-8219-E00A86995D3F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", matchCriteriaId: "4466C398-24F7-442F-9327-94E52B73FA7B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", matchCriteriaId: "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "05CE5511-6C01-4E19-A351-88B7A944531D", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", matchCriteriaId: "80482643-A5E8-4585-BAD7-E30B40F2552E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "258A5FF1-C199-4775-9ACC-902D649E751E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "22591C38-3610-4910-ABE5-1574446F6650", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", matchCriteriaId: "4855870F-388F-4E72-A4F8-AAE61187A433", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", matchCriteriaId: "BD88A7B3-23BE-411E-9415-B47B5896FFD6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", matchCriteriaId: "E19E7943-2097-4C17-B344-948AB45CA308", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", matchCriteriaId: "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", matchCriteriaId: "45B1D735-DC16-4B1A-A21D-599E7F12651C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", matchCriteriaId: "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", matchCriteriaId: "F0004217-3B76-48B1-97F7-F0E548FBD6D6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", matchCriteriaId: "392805F3-3B33-4E20-8108-6ED62DFE7480", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", matchCriteriaId: "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", matchCriteriaId: "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", matchCriteriaId: "CB86DA57-CE46-4651-84E1-409F2375A997", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", matchCriteriaId: "53A87A07-867B-48A9-BC89-47844EF461C6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", matchCriteriaId: "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", matchCriteriaId: "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", matchCriteriaId: "DC7693A6-11AC-4BF9-9307-49D028F19885", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", matchCriteriaId: "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", matchCriteriaId: "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*", matchCriteriaId: "F1501370-BC00-4456-9A52-EE4E9899567A", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", matchCriteriaId: "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", matchCriteriaId: "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", matchCriteriaId: "E585E98A-EB9A-492F-8902-85D99AC8E554", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", matchCriteriaId: "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", matchCriteriaId: "258BC823-5828-44B4-AFF5-A7E49281FD10", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*", matchCriteriaId: "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*", matchCriteriaId: "DD7E734A-22C1-4895-AE1F-2EB87126EBA7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*", matchCriteriaId: "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:poi:3.11:beta1:*:*:*:*:*:*", matchCriteriaId: "9F89551C-19B6-4731-AB01-831B5B9C8C27", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.", }, { lang: "es", value: "Apache POI anterior a 3.10.1 y 3.11.x anterior a 3.11-beta2 permite a atacantes remotos causar una denegación de servicio (consumo de CPU y caída) a través de un fichero OOXML manipulado, también conocido como un ataque de expansión de entidad XML (XEE).", }, ], evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>", id: "CVE-2014-3574", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-09-04T17:55:05.670", references: [ { source: "secalert@redhat.com", url: "http://poi.apache.org/changes.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/59943", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/60419", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/61766", }, { source: "secalert@redhat.com", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/69648", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://poi.apache.org/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/59943", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60419", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61766", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/69648", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-23 20:15
Modified
2024-11-21 04:22
Severity ?
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "1D82A205-F4BE-4C18-A764-A2364B50BAD9", versionEndIncluding: "4.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "17EA8B91-7634-4636-B647-1049BA7CA088", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "5B4DF46F-DBCC-41F2-A260-F83A14838F23", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "10F17843-32EA-4C31-B65C-F424447BEF7B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "A125E817-F974-4509-872C-B71933F42AD1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_enterprise_originations:2.7.0:*:*:*:*:*:*:*", matchCriteriaId: "7AB8ABFD-C72C-4CBB-8872-9440A19154D6", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_enterprise_originations:2.8.0:*:*:*:*:*:*:*", matchCriteriaId: "3054FEBB-484B-4927-9D1C-2024772E8B3D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*", matchCriteriaId: "5AED3C78-7D65-4F02-820D-B51BCE4022F9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*", matchCriteriaId: "557A23A1-4762-4D29-A478-D1670C1847D3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_payments:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7BE6EB99-98BF-49A2-8890-829320607A1B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_payments:14.1.0:*:*:*:*:*:*:*", matchCriteriaId: "FD48BA85-B6D3-4BFD-9B48-755494FF094E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C2BEE49E-A5AA-42D3-B422-460454505480", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F4FF66F7-10C8-4A1C-910A-EF7D12A4284C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "35AD0C07-9688-4397-8D45-FBB88C0F0C11", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "8972497F-6E24-45A9-9A18-EB0E842CB1D4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "400509A8-D6F2-432C-A2F1-AD5B8778D0D9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "132CE62A-FBFC-4001-81EC-35D81F73AF48", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*", matchCriteriaId: "282150FF-C945-4A3E-8A80-E8757A8907EA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*", matchCriteriaId: "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*", matchCriteriaId: "AB9FC9AB-1070-420F-870E-A5EC43A924A4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:big_data_discovery:1.6:*:*:*:*:*:*:*", matchCriteriaId: "8C4C38FF-B75B-4DF1-BFB3-C91BDD10D90E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.0.0:*:*:*:*:*:*:*", matchCriteriaId: "B2FDA4C6-68BA-4090-9645-A1A3C526F86C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.2.2:*:*:*:*:*:*:*", matchCriteriaId: "00F3F284-E638-495D-89D0-AEB0CCA969CB", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*", matchCriteriaId: "9D03A8C9-35A5-4B75-9711-7A4A60457307", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "36E39918-B2D6-43F0-A607-8FD8BFF6F340", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7582B307-3899-4BBB-B868-BC912A4D0109", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", matchCriteriaId: "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:*", matchCriteriaId: "F9E13DD9-F456-4802-84AD-A2A1F12FE999", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", matchCriteriaId: "40F940AA-05BE-426C-89A3-4098E107D9A7", versionEndIncluding: "8.0.9", versionStartIncluding: "8.0.6", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*", matchCriteriaId: "EF6D5112-4055-4F89-A5B3-0DCB109481B7", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*", matchCriteriaId: "D262848E-AA24-4057-A747-6221BA22ADF4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "6762F207-93C7-4363-B2F9-7A7C6F8AF993", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "1B74B912-152D-4F38-9FC1-741D6D0B27FC", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", matchCriteriaId: "DED59B62-C9BF-4C0E-B351-3884E8441655", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*", matchCriteriaId: "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*", matchCriteriaId: "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*", matchCriteriaId: "7F69B9A5-F21B-4904-9F27-95C0F7A628E3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2:*:*:*:*:*:*:*", matchCriteriaId: "9A570E5E-A3BC-4E19-BC44-C28D8BC9A537", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0:*:*:*:*:*:*:*", matchCriteriaId: "991B23C1-83FA-40B1-AF0A-9A7B10A9EDA1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0:*:*:*:*:*:*:*", matchCriteriaId: "D56B4193-4DB7-4BD9-85FF-8665601E6D4F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*", matchCriteriaId: "AEDF91E2-E7B5-40EE-B71F-C7D59F4021BD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*", matchCriteriaId: "9A94F93C-5828-4D78-9C48-20AC17E72B8E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F3E25293-CB03-44CE-A8ED-04B3A0487A6A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*", matchCriteriaId: "4F9721E3-EE25-4C8A-9E0A-E60D465E0A97", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.2.0:*:*:*:*:*:*:*", matchCriteriaId: "E08D8FE6-2BB4-4FF6-8B42-2D47F6FBFDFA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*", matchCriteriaId: "335AB6A7-3B1F-4FA8-AF08-7D64C16C4B04", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", matchCriteriaId: "7E1E416B-920B-49A0-9523-382898C2979D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", matchCriteriaId: "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", matchCriteriaId: "C8AF00C6-B97F-414D-A8DF-057E6BFD8597", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:primavera_gateway:17.12.6:*:*:*:*:*:*:*", matchCriteriaId: "2F5647E5-B051-41A6-B186-3584C725908B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:primavera_gateway:18.8.8.1:*:*:*:*:*:*:*", matchCriteriaId: "4A405B01-7DC5-41A0-9B61-C2DBE1C71A67", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", matchCriteriaId: "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", versionEndIncluding: "17.12", versionStartIncluding: "17.7", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", matchCriteriaId: "D55A54FD-7DD1-49CD-BE81-0BE73990943C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", matchCriteriaId: "82EB08C0-2D46-4635-88DF-E54F6452D3A3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", matchCriteriaId: "202AD518-2E9B-4062-B063-9858AE1F9CE2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", matchCriteriaId: "10864586-270E-4ACF-BDCC-ECFCD299305F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0:*:*:*:*:*:*:*", matchCriteriaId: "C8109973-AE49-4E2C-B3A0-DDB18674C1FA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*", matchCriteriaId: "EE8CF045-09BB-4069-BCEC-496D5AE3B780", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*", matchCriteriaId: "38E74E68-7F19-4EF3-AC00-3C249EAAA39E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*", matchCriteriaId: "24A3C819-5151-4543-A5C6-998C9387C8A2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4FB98961-8C99-4490-A6B8-9A5158784F5A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "D6A4F71A-4269-40FC-8F61-1D1301F2B728", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*", matchCriteriaId: "5A502118-5B2B-47AE-82EC-1999BD841103", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "D551CAB1-4312-44AA-BDA8-A030817E153A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*", matchCriteriaId: "174A6D2E-E42E-4C92-A194-C6A820CD7EF4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.", }, { lang: "es", value: "En Apache POI versiones hasta 4.1.0, cuando se utiliza la herramienta XSSFExportToXml para convertir documentos de Microsoft Excel proporcionados por el usuario, un documento especialmente diseñado puede permitir a un atacante leer archivos del sistema de archivos local o de los recursos de la red interna por medio de un Procesamiento de Entidad Externa XML (XXE).", }, ], id: "CVE-2019-12415", lastModified: "2024-11-21T04:22:47.553", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-23T20:15:12.707", references: [ { source: "security@apache.org", url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com//security-alerts/cpujul2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujan2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-611", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-03-24 14:59
Modified
2024-11-21 03:28
Severity ?
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "40E6BF2C-539C-4F80-A5CE-1B6BB3B08F31", versionEndIncluding: "3.14", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.", }, { lang: "es", value: "Apache POI en versiones anteriores al lanzamiento 3.15 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través de un archivo OOXML especialmente manipulado, vulnerabilidad también conocida como un ataque de XML Entity Expansion (XEE).", }, ], id: "CVE-2017-5644", lastModified: "2024-11-21T03:28:05.180", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-03-24T14:59:00.273", references: [ { source: "security@apache.org", tags: [ "Vendor Advisory", ], url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", }, { source: "security@apache.org", url: "http://www.securityfocus.com/bid/96983", }, { source: "security@apache.org", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/96983", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-776", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", matchCriteriaId: "8A37C616-D64C-4067-91D5-0F288E4ABCEF", versionEndIncluding: "3.13", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", }, { lang: "es", value: "El ejemplo XLSX2CSV en Apache POI en versiones anteriores a 3.14 permite a atacantes remotos leer archivos arbitrarios a través de un documento OpenXML manipulado que contiene una declaración de entidad externa en relación con una referencia a entidad, relacionado con un problema XML External Entity (XXE).", }, ], id: "CVE-2016-5000", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-08-05T14:59:10.143", references: [ { source: "secalert@redhat.com", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/92100", }, { source: "secalert@redhat.com", url: "http://www.securitytracker.com/id/1037741", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/list.html?user%40poi.apache.org", }, { source: "secalert@redhat.com", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/92100", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1037741", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/list.html?user%40poi.apache.org", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpuoct2020.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-611", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }