XML External Entity Reference in Apache Cayenne
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Package
Affected versions
< 3.1.3
>= 4.0, < 4.1
Patched versions
3.1.3
4.1
Description
Published by the National Vulnerability Database
Aug 22, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Nov 4, 2022
Last updated
Feb 2, 2023
This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing.
References