Lucene search

K
certCERTVU:779243
HistoryDec 13, 2016 - 12:00 a.m.

EpubCheck 4.0.1 contains a XML external entity processing vulnerability

2016-12-1300:00:00
www.kb.cert.org
25

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

31.3%

Overview

EpubCheck 4.0.1 is vulnerable to external XML entity processing attacks.

Description

EpubCheck is a tool to validate that EPUB files follow the proper format. It can be used as a stand alone command line utility, or included in a project (most commonly being epub readers) as a library.

CWE-611: Improper Restriction of XML External Entity Reference (‘XXE’) - CVE-2016-9487
EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim’s trust relationship with other entities.


Impact

A remote attacker may be able to access arbitrary files on a system, or cause the system execute arbitrary requests.


Solution

Apply an update

EpubCheck has released version 4.0.2 to address the vulnerability.


Vendor Information

779243

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Adobe __ Affected

Updated: December 13, 2016

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Adobe has released an update for affected products.

Vendor References

Apple __ Affected

Updated: December 14, 2016

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Apple has released updates to address affected products.

Vendor References

International Digital Publishing Forum Affected

Notified: October 13, 2016 Updated: December 09, 2016

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.9 E:–/RL:OF/RC:C
Environmental 4.5 CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Craig Arendt for reporting this vulnerability.

This document was written by Trent Novelly.

Other Information

CVE IDs: CVE-2016-9487
Date Public: 2016-12-13 Date First Published:

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

31.3%