[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-3529Date: (C)2014-09-06   (M)2023-12-22


The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECUNIA-59943
SECUNIA-60419
SECUNIA-61766
BID-69647
BID-78018
RHSA-2014:1370
RHSA-2014:1398
RHSA-2014:1399
RHSA-2014:1400
apache-poi-cve20143529-info-disc(95770)
http://poi.apache.org/changes.html
http://www-01.ibm.com/support/docview.wss?uid=swg21996759
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations

CPE    63
cpe:/a:apache:poi:1.5
cpe:/a:apache:poi:3.1
cpe:/a:apache:poi:3.2
cpe:/a:apache:poi:3.7
...
OVAL    3
oval:org.secpod.oval:def:108444
oval:org.secpod.oval:def:107477
oval:org.secpod.oval:def:108440

© SecPod Technologies