CVE-2018-11758
Summary
| CVE | CVE-2018-11758 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-08-22 20:29:00 UTC |
| Updated | 2023-11-07 02:51:00 UTC |
| Description | This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing. |
Risk And Classification
Problem Types: CWE-611
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Cayenne | 3.1.1 | All | All | All |
| Application | Apache | Cayenne | 3.1.2 | All | All | All |
| Application | Apache | Cayenne | 3.2 | milestone1 | All | All |
| Application | Apache | Cayenne | 4.0 | beta1 | All | All |
| Application | Apache | Cayenne | 4.0 | beta2 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone2 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone3 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone4 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone5 | All | All |
| Application | Apache | Cayenne | 4.0 | rc1 | All | All |
| Application | Apache | Cayenne | 4.1 | milestone1 | All | All |
| Application | Apache | Cayenne | 3.1.1 | All | All | All |
| Application | Apache | Cayenne | 3.1.2 | All | All | All |
| Application | Apache | Cayenne | 3.2 | milestone1 | All | All |
| Application | Apache | Cayenne | 4.0 | beta1 | All | All |
| Application | Apache | Cayenne | 4.0 | beta2 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone2 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone3 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone4 | All | All |
| Application | Apache | Cayenne | 4.0 | milestone5 | All | All |
| Application | Apache | Cayenne | 4.0 | rc1 | All | All |
| Application | Apache | Cayenne | 4.1 | milestone1 | All | All |
| Application | Apache | Cayenne | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| Pony Mail! | lists.apache.org | ||
| Apache Cayenne CVE-2018-11758 XML External Entity Injection Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.