{"api_version":"1","generated_at":"2026-04-22T21:38:27+00:00","cve":"CVE-2022-21949","urls":{"html":"https://cve.report/CVE-2022-21949","api":"https://cve.report/api/cve/CVE-2022-21949.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-21949","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-21949"},"summary":{"title":"CVE-2022-21949","description":"A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13.","state":"PUBLIC","assigner":"security@suse.com","published_at":"2022-05-03 08:15:00","updated_at":"2022-05-10 14:17:00"},"problem_types":["CWE-611"],"metrics":[],"references":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1197928","name":"https://bugzilla.suse.com/show_bug.cgi?id=1197928","refsource":"CONFIRM","tags":[],"title":"Bug 1197928 – VUL-0: CVE-2022-21949: obs-server: Multiple XXE vulnerabilities in OBS","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-21949","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21949","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Victor Pereira of SUSE","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"21949","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opensuse","cpe5":"open_build_service","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-21949","qid":"183775","title":"Debian Security Update for ruby-xmlhash (CVE-2022-21949)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@suse.com","DATE_PUBLIC":"2022-04-20T00:00:00.000Z","ID":"CVE-2022-21949","STATE":"PUBLIC","TITLE":"Multiple XXE vulnerabilities in OBS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Open Build Service","version":{"version_data":[{"version_affected":"<","version_name":"Open Build Service","version_value":"2.10.13"}]}}]},"vendor_name":"SUSE"}]}},"credit":[{"lang":"eng","value":"Victor Pereira of SUSE"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-611: Improper Restriction of XML External Entity Reference"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1197928","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1197928"}]},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1197928","defect":["1197928"],"discovery":"INTERNAL"}},"nvd":{"publishedDate":"2022-05-03 08:15:00","lastModifiedDate":"2022-05-10 14:17:00","problem_types":["CWE-611"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*","versionEndExcluding":"2.10.13","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"21949","Ordinal":"223113","Title":"CVE-2022-21949","CVE":"CVE-2022-21949","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"21949","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}