The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://poi.apache.org/changes.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1370.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1398.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1399.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1400.html - | |
References | () http://secunia.com/advisories/59943 - | |
References | () http://secunia.com/advisories/60419 - | |
References | () http://secunia.com/advisories/61766 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21996759 - | |
References | () http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt - | |
References | () http://www.securityfocus.com/bid/69647 - | |
References | () http://www.securityfocus.com/bid/78018 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/95770 - | |
References | () https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations - Vendor Advisory |
Information
Published : 2014-09-04 17:55
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3529
Mitre link : CVE-2014-3529
CVE.ORG link : CVE-2014-3529
JSON object : View
Products Affected
apache
- poi
CWE