dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2020-05-01 19:15
Updated : 2022-07-25 18:15
NVD link : CVE-2020-10683
Mitre link : CVE-2020-10683
JSON object : View
Products Affected
oracle
- retail_price_management
- agile_plm
- primavera_p6_enterprise_project_portfolio_management
- communications_diameter_signaling_router
- fusion_middleware
- flexcube_core_banking
- rapid_planning
- enterprise_manager_base_platform
- storagetek_tape_analytics_sw_tool
- documaker
- communications_unified_inventory_management
- application_testing_suite
- jdeveloper
- utilities_framework
- retail_integration_bus
- insurance_rules_palette
- business_process_management_suite
- retail_xstore_point_of_service
- retail_order_broker
- health_sciences_information_manager
- endeca_information_discovery_integrator
- banking_platform
- health_sciences_empirica_signal
- webcenter_portal
- communications_application_session_controller
- insurance_policy_administration_j2ee
- data_integrator
- financial_services_analytical_applications_infrastructure
- enterprise_data_quality
- retail_customer_management_and_segmentation_foundation
netapp
- oncommand_api_services
- snapmanager
- snap_creator_framework
- snapcenter
- oncommand_workflow_automation
canonical
- ubuntu_linux
opensuse
- leap
dom4j_project
- dom4j
CWE
CWE-611
Improper Restriction of XML External Entity Reference
