CVE-2022-33977 (GCVE-0-2022-33977)
Vulnerability from cvelistv5 – Published: 2022-07-26 05:10 – Updated: 2024-08-03 08:16
VLAI?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Christian Stefanescu | untangle |
Affected:
1.2.0 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T08:16:16.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "untangle",
"vendor": "Christian Stefanescu",
"versions": [
{
"status": "affected",
"version": "1.2.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-26T05:10:43",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-33977",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "untangle",
"version": {
"version_data": [
{
"version_value": "1.2.0 and earlier"
}
]
}
}
]
},
"vendor_name": "Christian Stefanescu"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/stchris/untangle",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle"
},
{
"name": "https://github.com/stchris/untangle/releases/tag/1.2.1",
"refsource": "MISC",
"url": "https://github.com/stchris/untangle/releases/tag/1.2.1"
},
{
"name": "https://jvn.jp/en/jp/JVN30454777/",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN30454777/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-33977",
"datePublished": "2022-07-26T05:10:44",
"dateReserved": "2022-07-12T00:00:00",
"dateUpdated": "2024-08-03T08:16:16.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:untangle_project:untangle:*:*:*:*:*:python:*:*\", \"versionEndIncluding\": \"1.2.0\", \"matchCriteriaId\": \"EE28162D-2C6D-4E0F-97EC-4E4C84A199EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.\"}, {\"lang\": \"es\", \"value\": \"untangle es una biblioteca de python para convertir datos XML en objetos de python. untangle versiones 1.2.0 y anteriores restringen inapropiadamente las referencias a entidades recursivas en los DTD. Al explotar esta vulnerabilidad, un atacante remoto no autenticado puede causar una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS) en el servidor donde es ejecutado el producto.\\n\"}]",
"id": "CVE-2022-33977",
"lastModified": "2024-11-21T07:08:42.270",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2022-07-26T06:15:08.957",
"references": "[{\"url\": \"https://github.com/stchris/untangle\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Product\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stchris/untangle/releases/tag/1.2.1\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN30454777/\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/stchris/untangle\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stchris/untangle/releases/tag/1.2.1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN30454777/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-776\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-33977\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2022-07-26T06:15:08.957\",\"lastModified\":\"2024-11-21T07:08:42.270\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.\"},{\"lang\":\"es\",\"value\":\"untangle es una biblioteca de python para convertir datos XML en objetos de python. untangle versiones 1.2.0 y anteriores restringen inapropiadamente las referencias a entidades recursivas en los DTD. Al explotar esta vulnerabilidad, un atacante remoto no autenticado puede causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servidor donde es ejecutado el producto.\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-776\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:untangle_project:untangle:*:*:*:*:*:python:*:*\",\"versionEndIncluding\":\"1.2.0\",\"matchCriteriaId\":\"EE28162D-2C6D-4E0F-97EC-4E4C84A199EA\"}]}]}],\"references\":[{\"url\":\"https://github.com/stchris/untangle\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stchris/untangle/releases/tag/1.2.1\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN30454777/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/stchris/untangle\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stchris/untangle/releases/tag/1.2.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN30454777/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…