Search criteria
6 vulnerabilities found for untangle by untangle_project
FKIE_CVE-2022-31471
Vulnerability from fkie_nvd - Published: 2022-07-26 06:15 - Updated: 2024-11-21 07:04
Severity ?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://github.com/stchris/untangle | Product, Third Party Advisory | |
| vultures@jpcert.or.jp | https://github.com/stchris/untangle/releases/tag/1.2.1 | Release Notes, Third Party Advisory | |
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN30454777/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/stchris/untangle | Product, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/stchris/untangle/releases/tag/1.2.1 | Release Notes, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN30454777/ | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| untangle_project | untangle | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:untangle_project:untangle:*:*:*:*:*:python:*:*",
"matchCriteriaId": "EE28162D-2C6D-4E0F-97EC-4E4C84A199EA",
"versionEndIncluding": "1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files."
},
{
"lang": "es",
"value": "untangle es una biblioteca de python para convertir datos XML en objetos de python. untangle versiones 1.2.0 y anteriores restringen inapropiadamente las referencias de tipo XML external entity. Al explotar esta vulnerabilidad, un atacante remoto no autenticado puede leer el contenido de los archivos locales."
}
],
"id": "CVE-2022-31471",
"lastModified": "2024-11-21T07:04:31.290",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-07-26T06:15:08.817",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2022-33977
Vulnerability from fkie_nvd - Published: 2022-07-26 06:15 - Updated: 2024-11-21 07:08
Severity ?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://github.com/stchris/untangle | Product, Third Party Advisory | |
| vultures@jpcert.or.jp | https://github.com/stchris/untangle/releases/tag/1.2.1 | Release Notes, Third Party Advisory | |
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN30454777/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/stchris/untangle | Product, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/stchris/untangle/releases/tag/1.2.1 | Release Notes, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN30454777/ | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| untangle_project | untangle | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:untangle_project:untangle:*:*:*:*:*:python:*:*",
"matchCriteriaId": "EE28162D-2C6D-4E0F-97EC-4E4C84A199EA",
"versionEndIncluding": "1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running."
},
{
"lang": "es",
"value": "untangle es una biblioteca de python para convertir datos XML en objetos de python. untangle versiones 1.2.0 y anteriores restringen inapropiadamente las referencias a entidades recursivas en los DTD. Al explotar esta vulnerabilidad, un atacante remoto no autenticado puede causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servidor donde es ejecutado el producto.\n"
}
],
"id": "CVE-2022-33977",
"lastModified": "2024-11-21T07:08:42.270",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-07-26T06:15:08.957",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-776"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2022-33977 (GCVE-0-2022-33977)
Vulnerability from cvelistv5 – Published: 2022-07-26 05:10 – Updated: 2024-08-03 08:16
VLAI?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Christian Stefanescu | untangle |
Affected:
1.2.0 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T08:16:16.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "untangle",
"vendor": "Christian Stefanescu",
"versions": [
{
"status": "affected",
"version": "1.2.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-26T05:10:43",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-33977",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "untangle",
"version": {
"version_data": [
{
"version_value": "1.2.0 and earlier"
}
]
}
}
]
},
"vendor_name": "Christian Stefanescu"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/stchris/untangle",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle"
},
{
"name": "https://github.com/stchris/untangle/releases/tag/1.2.1",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"name": "https://jvn.jp/en/jp/JVN30454777/",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-33977",
"datePublished": "2022-07-26T05:10:44",
"dateReserved": "2022-07-12T00:00:00",
"dateUpdated": "2024-08-03T08:16:16.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-31471 (GCVE-0-2022-31471)
Vulnerability from cvelistv5 – Published: 2022-07-26 05:10 – Updated: 2024-08-03 07:19
VLAI?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of XML External Entity Reference (XXE)
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Christian Stefanescu | untangle |
Affected:
1.2.0 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:19:06.083Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "untangle",
"vendor": "Christian Stefanescu",
"versions": [
{
"status": "affected",
"version": "1.2.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of XML External Entity Reference (XXE)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-26T05:10:27",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-31471",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "untangle",
"version": {
"version_data": [
{
"version_value": "1.2.0 and earlier"
}
]
}
}
]
},
"vendor_name": "Christian Stefanescu"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of XML External Entity Reference (XXE)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/stchris/untangle",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle"
},
{
"name": "https://github.com/stchris/untangle/releases/tag/1.2.1",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"name": "https://jvn.jp/en/jp/JVN30454777/",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-31471",
"datePublished": "2022-07-26T05:10:27",
"dateReserved": "2022-07-12T00:00:00",
"dateUpdated": "2024-08-03T07:19:06.083Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-33977 (GCVE-0-2022-33977)
Vulnerability from nvd – Published: 2022-07-26 05:10 – Updated: 2024-08-03 08:16
VLAI?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Christian Stefanescu | untangle |
Affected:
1.2.0 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T08:16:16.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "untangle",
"vendor": "Christian Stefanescu",
"versions": [
{
"status": "affected",
"version": "1.2.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-26T05:10:43",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-33977",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "untangle",
"version": {
"version_data": [
{
"version_value": "1.2.0 and earlier"
}
]
}
}
]
},
"vendor_name": "Christian Stefanescu"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/stchris/untangle",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle"
},
{
"name": "https://github.com/stchris/untangle/releases/tag/1.2.1",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"name": "https://jvn.jp/en/jp/JVN30454777/",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-33977",
"datePublished": "2022-07-26T05:10:44",
"dateReserved": "2022-07-12T00:00:00",
"dateUpdated": "2024-08-03T08:16:16.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-31471 (GCVE-0-2022-31471)
Vulnerability from nvd – Published: 2022-07-26 05:10 – Updated: 2024-08-03 07:19
VLAI?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of XML External Entity Reference (XXE)
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Christian Stefanescu | untangle |
Affected:
1.2.0 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:19:06.083Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "untangle",
"vendor": "Christian Stefanescu",
"versions": [
{
"status": "affected",
"version": "1.2.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of XML External Entity Reference (XXE)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-26T05:10:27",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-31471",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "untangle",
"version": {
"version_data": [
{
"version_value": "1.2.0 and earlier"
}
]
}
}
]
},
"vendor_name": "Christian Stefanescu"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of XML External Entity Reference (XXE)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/stchris/untangle",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle"
},
{
"name": "https://github.com/stchris/untangle/releases/tag/1.2.1",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"name": "https://jvn.jp/en/jp/JVN30454777/",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-31471",
"datePublished": "2022-07-26T05:10:27",
"dateReserved": "2022-07-12T00:00:00",
"dateUpdated": "2024-08-03T07:19:06.083Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}