CVE-2014-1626

XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:galen_charlton:marc-xml:*:*:*:*:*:*:*:*
cpe:2.3:a:galen_charlton:marc-xml:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://libmail.georgialibraries.org/pipermail/open-ils-general/2014-January/009442.html - () http://libmail.georgialibraries.org/pipermail/open-ils-general/2014-January/009442.html -
References () http://lists.katipo.co.nz/pipermail/koha/2014-January/038430.html - () http://lists.katipo.co.nz/pipermail/koha/2014-January/038430.html -
References () http://osvdb.org/102367 - () http://osvdb.org/102367 -
References () http://secunia.com/advisories/55404 - Vendor Advisory () http://secunia.com/advisories/55404 - Vendor Advisory
References () http://www.nntp.perl.org/group/perl.perl4lib/2014/01/msg3073.html - () http://www.nntp.perl.org/group/perl.perl4lib/2014/01/msg3073.html -
References () http://www.securityfocus.com/bid/65057 - () http://www.securityfocus.com/bid/65057 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/90620 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/90620 -
References () https://metacpan.org/source/GMCHARLT/MARC-XML-1.0.2/Changes - () https://metacpan.org/source/GMCHARLT/MARC-XML-1.0.2/Changes -

Information

Published : 2014-01-26 01:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1626

Mitre link : CVE-2014-1626

CVE.ORG link : CVE-2014-1626


JSON object : View

Products Affected

galen_charlton

  • marc-xml
CWE
CWE-264

Permissions, Privileges, and Access Controls