Lucene search

K
githubGitHub Advisory DatabaseGHSA-X64M-686F-FMM3
HistoryMay 17, 2022 - 5:09 a.m.

XML External Entity (XXE) in Django

2022-05-1705:09:39
CWE-200
CWE-611
GitHub Advisory Database
github.com
1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

69.1%

The XML libraries for Python as used in OpenStack Keystone Essex and Folsom, Django, and possibly other products allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) attack.

Affected configurations

Vulners
Node
django_projectdjangoRange<1.4.4
OR
django_projectdjangoRange<1.3.6
CPENameOperatorVersion
djangolt1.4.4
djangolt1.3.6

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

69.1%