CVE-2022-33977
Vulnerability from cvelistv5
Published
2022-07-26 05:10
Modified
2024-08-03 08:16
Severity ?
EPSS score ?
Summary
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://github.com/stchris/untangle | Product, Third Party Advisory | |
vultures@jpcert.or.jp | https://github.com/stchris/untangle/releases/tag/1.2.1 | Release Notes, Third Party Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN30454777/ | Third Party Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Christian Stefanescu | untangle |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:16:16.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/stchris/untangle" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/stchris/untangle/releases/tag/1.2.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN30454777/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "untangle", "vendor": "Christian Stefanescu", "versions": [ { "status": "affected", "version": "1.2.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-26T05:10:43", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/stchris/untangle" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/stchris/untangle/releases/tag/1.2.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN30454777/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-33977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "untangle", "version": { "version_data": [ { "version_value": "1.2.0 and earlier" } ] } } ] }, "vendor_name": "Christian Stefanescu" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/stchris/untangle", "refsource": "MISC", "url": "https://github.com/stchris/untangle" }, { "name": "https://github.com/stchris/untangle/releases/tag/1.2.1", "refsource": "MISC", "url": "https://github.com/stchris/untangle/releases/tag/1.2.1" }, { "name": "https://jvn.jp/en/jp/JVN30454777/", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN30454777/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-33977", "datePublished": "2022-07-26T05:10:44", "dateReserved": "2022-07-12T00:00:00", "dateUpdated": "2024-08-03T08:16:16.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-33977\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2022-07-26T06:15:08.957\",\"lastModified\":\"2022-08-01T16:36:19.407\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts recursive entity references in DTDs. By exploiting this vulnerability, a remote unauthenticated attacker may cause a denial-of-service (DoS) condition on the server where the product is running.\"},{\"lang\":\"es\",\"value\":\"untangle es una biblioteca de python para convertir datos XML en objetos de python. untangle versiones 1.2.0 y anteriores restringen inapropiadamente las referencias a entidades recursivas en los DTD. Al explotar esta vulnerabilidad, un atacante remoto no autenticado puede causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servidor donde es ejecutado el producto.\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-776\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:untangle_project:untangle:*:*:*:*:*:python:*:*\",\"versionEndIncluding\":\"1.2.0\",\"matchCriteriaId\":\"EE28162D-2C6D-4E0F-97EC-4E4C84A199EA\"}]}]}],\"references\":[{\"url\":\"https://github.com/stchris/untangle\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stchris/untangle/releases/tag/1.2.1\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN30454777/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.