XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://libmail.georgialibraries.org/pipermail/open-ils-general/2014-January/009442.html - | |
References | () http://lists.katipo.co.nz/pipermail/koha/2014-January/038430.html - | |
References | () http://osvdb.org/102367 - | |
References | () http://secunia.com/advisories/55404 - Vendor Advisory | |
References | () http://www.nntp.perl.org/group/perl.perl4lib/2014/01/msg3073.html - | |
References | () http://www.securityfocus.com/bid/65057 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90620 - | |
References | () https://metacpan.org/source/GMCHARLT/MARC-XML-1.0.2/Changes - |
Information
Published : 2014-01-26 01:55
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1626
Mitre link : CVE-2014-1626
CVE.ORG link : CVE-2014-1626
JSON object : View
Products Affected
galen_charlton
- marc-xml
CWE
CWE-264
Permissions, Privileges, and Access Controls