CVE-2015-1832

XML external entity (XXE) vulnerability in the SqlXmlUtil code in Apache Derby before 10.12.1.1, when a Java Security Manager is not in place, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving XmlVTI and the XML datatype.
References
Link Resource
http://www-01.ibm.com/support/docview.wss?uid=swg21990100 Third Party Advisory
http://www.securityfocus.com/bid/93132 Third Party Advisory VDB Entry
https://issues.apache.org/jira/browse/DERBY-6807 Issue Tracking
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
https://svn.apache.org/viewvc?view=revision&revision=1691461 Issue Tracking
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
http://www-01.ibm.com/support/docview.wss?uid=swg21990100 Third Party Advisory
http://www.securityfocus.com/bid/93132 Third Party Advisory VDB Entry
https://issues.apache.org/jira/browse/DERBY-6807 Issue Tracking
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
https://svn.apache.org/viewvc?view=revision&revision=1691461 Issue Tracking
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:derby:10.1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.8.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.9.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.10.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:derby:10.11.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:26

Type Values Removed Values Added
References () http://www-01.ibm.com/support/docview.wss?uid=swg21990100 - Third Party Advisory () http://www-01.ibm.com/support/docview.wss?uid=swg21990100 - Third Party Advisory
References () http://www.securityfocus.com/bid/93132 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93132 - Third Party Advisory, VDB Entry
References () https://issues.apache.org/jira/browse/DERBY-6807 - Issue Tracking () https://issues.apache.org/jira/browse/DERBY-6807 - Issue Tracking
References () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E - () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E -
References () https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E - () https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E -
References () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E - () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E -
References () https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E - () https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E -
References () https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E - () https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E -
References () https://svn.apache.org/viewvc?view=revision&revision=1691461 - Issue Tracking () https://svn.apache.org/viewvc?view=revision&revision=1691461 - Issue Tracking
References () https://www.oracle.com/security-alerts/cpuapr2020.html - () https://www.oracle.com/security-alerts/cpuapr2020.html -
References () https://www.oracle.com/security-alerts/cpuoct2020.html - () https://www.oracle.com/security-alerts/cpuoct2020.html -
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -
References () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -

07 Nov 2023, 02:24

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'name': '[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'name': '[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'name': '[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'name': '[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'name': '[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E -
  • () https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E -
  • () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E -
  • () https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E -
  • () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E -

Information

Published : 2016-10-03 21:59

Updated : 2024-11-21 02:26


NVD link : CVE-2015-1832

Mitre link : CVE-2015-1832

CVE.ORG link : CVE-2015-1832


JSON object : View

Products Affected

apache

  • derby
CWE
CWE-399

Resource Management Errors

CWE-611

Improper Restriction of XML External Entity Reference