CVE-2022-28890
Vulnerability from cvelistv5
Published
2022-05-05 08:40
Modified
2024-08-03 06:10
Severity ?
EPSS score ?
Summary
Processing external DTDs
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878 | Mailing List, Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache Jena |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:56.881Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Jena", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.4.0", "status": "affected", "version": "Apache Jena", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Apache Jena would like to thank Feras Daragma, Avishag Shapira \u0026 Amit Laish (GE Digital, Cyber Security Lab) for their report." } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and 4.3.x do not allow external entities." } ], "metrics": [ { "other": { "content": { "other": "medium" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "description": "XML External DTD vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T08:40:09", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878" } ], "source": { "discovery": "UNKNOWN" }, "title": "Processing external DTDs", "workarounds": [ { "lang": "en", "value": "Users are advised to upgrade to Apache Jena 4.5.0 or later." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-28890", "STATE": "PUBLIC", "TITLE": "Processing external DTDs" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Jena", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache Jena", "version_value": "4.4.0" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache Jena would like to thank Feras Daragma, Avishag Shapira \u0026 Amit Laish (GE Digital, Cyber Security Lab) for their report." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and 4.3.x do not allow external entities." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "medium" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML External DTD vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878", "refsource": "MISC", "url": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878" } ] }, "source": { "discovery": "UNKNOWN" }, "work_around": [ { "lang": "en", "value": "Users are advised to upgrade to Apache Jena 4.5.0 or later." } ] } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-28890", "datePublished": "2022-05-05T08:40:09", "dateReserved": "2022-04-09T00:00:00", "dateUpdated": "2024-08-03T06:10:56.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-28890\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2022-05-05T09:15:08.140\",\"lastModified\":\"2023-10-25T17:01:16.697\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and 4.3.x do not allow external entities.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el analizador RDF/X de Apache Jena permite a un atacante causar la recuperaci\u00f3n de un DTD externo. Este problema afecta a Apache Jena versi\u00f3n 4.4.0 y a las versiones anteriores. Apache Jena versiones 4.2.x y 4.3.x no permiten entidades externas\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-611\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:jena:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BECFCBB8-D1E4-4413-86EB-FDD040601A4F\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.