{"github": [{"lastseen": "2021-01-08T03:27:26", "bulletinFamily": "software", "cvelist": ["CVE-2020-15232"], "description": "### Impact\nA user can do to an XML External Entity (XXE) attack with the provided SDL style.\n\n### Patches\nUse version >= 3.24\n\n### Workarounds\nNo\n\n### References\n* https://cwe.mitre.org/data/definitions/611.html\n* https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e\n\n### For more information\nIf you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397", "edition": 4, "modified": "2021-01-07T23:47:51", "published": "2020-07-07T16:32:45", "id": "GHSA-VJV6-GQ77-3MJW", "href": "https://github.com/advisories/GHSA-vjv6-gq77-3mjw", "title": "XXE attack in Mapfish Print", "type": "github", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:P"}}]}