gsd-2021-40690
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
Aliases
Aliases
{ GSD: { alias: "CVE-2021-40690", description: "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", id: "GSD-2021-40690", references: [ "https://www.suse.com/security/cve/CVE-2021-40690.html", "https://www.debian.org/security/2021/dsa-5010", "https://access.redhat.com/errata/RHSA-2022:0501", "https://access.redhat.com/errata/RHSA-2022:0164", "https://access.redhat.com/errata/RHSA-2022:0155", "https://access.redhat.com/errata/RHSA-2022:0152", "https://access.redhat.com/errata/RHSA-2022:0151", "https://access.redhat.com/errata/RHSA-2022:0146", "https://access.redhat.com/errata/RHSA-2021:5170", "https://access.redhat.com/errata/RHSA-2021:5154", "https://access.redhat.com/errata/RHSA-2021:5151", "https://access.redhat.com/errata/RHSA-2021:5150", "https://access.redhat.com/errata/RHSA-2021:5149", "https://access.redhat.com/errata/RHSA-2022:1013", "https://access.redhat.com/errata/RHSA-2022:5532", "https://ubuntu.com/security/CVE-2021-40690", "https://access.redhat.com/errata/RHSA-2021:4679", "https://access.redhat.com/errata/RHSA-2022:6407", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-40690", ], details: "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", id: "GSD-2021-40690", modified: "2023-12-13T01:23:25.859121Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2021-40690", STATE: "PUBLIC", TITLE: "Bypass of the secureValidation property", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Santuario", version: { version_data: [ { version_affected: "<", version_name: "XML Security for Java", version_value: "2.2.3,2.1.7", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, credit: [ { lang: "eng", value: "An Trinh, Calif.", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: [ {}, ], problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", }, ], }, ], }, references: { reference_data: [ { name: "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", refsource: "MISC", url: "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", }, { name: "[tomee-commits] 20210922 [tomee] 02/02: Update xmlsec to 2.2.3 to mitigate CVE-2021-40690", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Resolved] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", url: "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Created] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Assigned] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E", }, { name: "[poi-user] 20210923 Re: CVE-2021-40690 on xmlsec jar", refsource: "MLIST", url: "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E", }, { name: "[debian-lts-announce] 20210927 [SECURITY] [DLA 2767-1] libxml-security-java security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html", }, { name: "[cxf-issues] 20211027 [jira] [Created] (CXF-8613) High Security issues reported with Apache Santuario library bundled in CXF 3.4.4", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E", }, { name: "[tomee-commits] 20211028 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E", }, { name: "DSA-5010", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-5010", }, { name: "https://www.oracle.com/security-alerts/cpuapr2022.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2022.html", }, { name: "https://www.oracle.com/security-alerts/cpujul2022.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { name: "https://security.netapp.com/advisory/ntap-20230818-0002/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20230818-0002/", }, ], }, source: { discovery: "UNKNOWN", }, }, "gitlab.com": { advisories: [ { affected_range: "[3.4.4]", affected_versions: "Version 3.4.4", cvss_v2: "AV:N/AC:L/Au:N/C:P/I:N/A:N", cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", cwe_ids: [ "CWE-1035", "CWE-200", "CWE-937", ], date: "2023-08-18", description: "Apache Santuario - XML Security for Java is vulnerable to an issue where the `secureValidation` property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", fixed_versions: [ "3.4.5", ], identifier: "CVE-2021-40690", identifiers: [ "CVE-2021-40690", ], not_impacted: "All versions before 3.4.4, all versions after 3.4.4", package_slug: "maven/org.apache.cxf/cxf", pubdate: "2021-09-19", solution: "Upgrade to version 3.4.5 or above.", title: "Exposure of Sensitive Information to an Unauthorized Actor", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "https://issues.apache.org/jira/browse/CXF-8613", "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E", "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html", "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E", "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E", "https://www.debian.org/security/2021/dsa-5010", ], uuid: "5bc587b1-3cce-44d3-ab10-6b72f9c22497", }, { affected_range: "(,2.1.7),[2.2.0,2.2.3)", affected_versions: "All versions before 2.1.7, all versions starting from 2.2.0 before 2.2.3", cvss_v2: "AV:N/AC:L/Au:N/C:P/I:N/A:N", cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", cwe_ids: [ "CWE-1035", "CWE-200", "CWE-937", ], date: "2023-08-18", description: "Apache Santuario - XML Security for Java is vulnerable to an issue where the `secureValidation` property is not passed correctly when creating a `KeyInfo` from a `KeyInfoReference` element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a `RetrievalMethod` element.", fixed_versions: [ "2.1.7", "2.2.3", ], identifier: "CVE-2021-40690", identifiers: [ "CVE-2021-40690", ], not_impacted: "All versions starting from 2.1.7 before 2.2.0, all versions starting from 2.2.3", package_slug: "maven/org.apache.santuario/xmlsec", pubdate: "2021-09-19", solution: "Upgrade to versions 2.1.7, 2.2.3 or above.", title: "Exposure of Sensitive Information to an Unauthorized Actor", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", ], uuid: "2304b624-0d1a-429d-b2de-ab16b2e9e356", }, { affected_range: "(,8.0.8)", affected_versions: "All versions before 8.0.8", cvss_v2: "AV:N/AC:L/Au:N/C:P/I:N/A:N", cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", cwe_ids: [ "CWE-1035", "CWE-200", "CWE-937", ], date: "2023-08-18", description: "All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", fixed_versions: [ "8.0.8", ], identifier: "CVE-2021-40690", identifiers: [ "CVE-2021-40690", ], not_impacted: "All versions starting from 8.0.8", package_slug: "maven/org.apache.tomee/openejb-lite", pubdate: "2021-09-19", solution: "Upgrade to version 8.0.8 or above.", title: "Exposure of Sensitive Information to an Unauthorized Actor", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", ], uuid: "df83d941-4d47-41e0-a154-59bfe3bd9e0d", }, { affected_range: "(,8.0.8)", affected_versions: "All versions before 8.0.8", cvss_v2: "AV:N/AC:L/Au:N/C:P/I:N/A:N", cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", cwe_ids: [ "CWE-1035", "CWE-200", "CWE-937", ], date: "2023-08-18", description: "All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", fixed_versions: [ "8.0.8", ], identifier: "CVE-2021-40690", identifiers: [ "CVE-2021-40690", ], not_impacted: "All versions starting from 8.0.8", package_slug: "maven/org.apache.tomee/tomee-webapp", pubdate: "2021-09-19", solution: "Upgrade to version 8.0.8 or above.", title: "Exposure of Sensitive Information to an Unauthorized Actor", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", ], uuid: "f9b6c0f1-d35e-4373-94d8-8d4c0914c9cd", }, { affected_range: "(,8.0.8)", affected_versions: "All versions before 8.0.8", cvss_v2: "AV:N/AC:L/Au:N/C:P/I:N/A:N", cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", cwe_ids: [ "CWE-1035", "CWE-200", "CWE-937", ], date: "2023-08-18", description: "All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", fixed_versions: [ "8.0.8", ], identifier: "CVE-2021-40690", identifiers: [ "CVE-2021-40690", ], not_impacted: "All versions starting from 8.0.8", package_slug: "maven/org.apache.tomee/tomee", pubdate: "2021-09-19", solution: "Upgrade to version 8.0.8 or above.", title: "Exposure of Sensitive Information to an Unauthorized Actor", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", ], uuid: "8976062c-9323-4e8e-92b4-08433bf87301", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.1.7", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.2.3", versionStartIncluding: "2.2.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0.8", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:apache:cxf:3.4.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "8.1.0", versionStartIncluding: "8.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "8.2.3", versionStartIncluding: "8.2.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2021-40690", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-200", }, ], }, ], }, references: { reference_data: [ { name: "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", refsource: "MISC", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", }, { name: "[tomee-commits] 20210922 [tomee] 02/02: Update xmlsec to 2.2.3 to mitigate CVE-2021-40690", refsource: "MLIST", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Resolved] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Assigned] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", tags: [ "Exploit", "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E", }, { name: "[tomee-commits] 20210923 [jira] [Created] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E", }, { name: "[poi-user] 20210923 Re: CVE-2021-40690 on xmlsec jar", refsource: "MLIST", tags: [ "Exploit", "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E", }, { name: "[debian-lts-announce] 20210927 [SECURITY] [DLA 2767-1] libxml-security-java security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html", }, { name: "[cxf-issues] 20211027 [jira] [Created] (CXF-8613) High Security issues reported with Apache Santuario library bundled in CXF 3.4.4", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E", }, { name: "[tomee-commits] 20211028 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E", }, { name: "DSA-5010", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-5010", }, { name: "https://www.oracle.com/security-alerts/cpuapr2022.html", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2022.html", }, { name: "N/A", refsource: "N/A", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { name: "https://security.netapp.com/advisory/ntap-20230818-0002/", refsource: "CONFIRM", tags: [], url: "https://security.netapp.com/advisory/ntap-20230818-0002/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2023-08-18T14:15Z", publishedDate: "2021-09-19T18:15Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.