Nivaskumark / external_expat_v2.1.0

Other
0 stars 0 forks source link

CVE-2013-0340 (Medium) detected in buffalo-gplexpat-2.1.0, buffalo-gplexpat-2.1.0 - autoclosed #32

Closed mend-bolt-for-github[bot] closed 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2013-0340 - Medium Severity Vulnerability

Vulnerable Libraries - buffalo-gplexpat-2.1.0, buffalo-gplexpat-2.1.0

Vulnerability Details

expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.

Publish Date: 2014-01-21

URL: CVE-2013-0340

CVSS 3 Score Details (5.6)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2013-0340

Release Date: 2014-01-21

Fix Resolution: ROOTMAP.Dependencies - 0.1.4;expat.v141 - 2.1.0.4;expat.v142 - 2.2.7


Step up your Open Source Security Game with WhiteSource here

mend-bolt-for-github[bot] commented 2 years ago

:information_source: This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #35

mend-bolt-for-github[bot] commented 2 years ago

:information_source: This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #35