CVE-2018-11758
CVSS V2 Medium 5.8
CVSS V3 High 8.1
Description
This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing.
Overview
- CVE ID
- CVE-2018-11758
- Assigner
- security@apache.org
- Vulnerability Status
- Analyzed
- Published Version
- 2018-08-22T20:29:00
- Last Modified Date
- 2018-11-02T14:34:18
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:apache:cayenne:*:*:*:*:*:*:*:* | 1 | OR | 3.1.0 | |
cpe:2.3:a:apache:cayenne:3.1.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:3.1.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:3.2:milestone1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.0:beta1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.0:beta2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.0:milestone2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.0:milestone3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.0:milestone4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.0:milestone5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.0:rc1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:cayenne:4.1:milestone1:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 5.8
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 4.9
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 8.1
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.2
References
Reference URL | Reference Tags |
---|---|
https://lists.apache.org/thread.html/ed60a4d329be3c722f105317ca883986dfcd17615c70d1df87f4528c@%3Cuser.cayenne.apache.org%3E | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/105142 | Third Party Advisory VDB Entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2018-11758 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11758 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:53:55 | Added to TrackCVE | |||
2022-12-03 11:23:25 | 2018-08-22T20:29Z | 2018-08-22T20:29:00 | CVE Published Date | updated |
2022-12-03 11:23:25 | 2018-11-02T14:34:18 | CVE Modified Date | updated | |
2022-12-03 11:23:25 | Analyzed | Vulnerability Status | updated |