CVE-2017-3208

The Java implementation of AMF3 deserializers used by WebORB for Java by Midnight Coders, version 5.1.1.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:themidnightcoders:weborb_for_java:5.1.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:25

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/97384 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97384 - Third Party Advisory, VDB Entry
References () http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution - Third Party Advisory () http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution - Third Party Advisory
References () https://codewhitesec.blogspot.com/2017/04/amf.html - Exploit, Third Party Advisory () https://codewhitesec.blogspot.com/2017/04/amf.html - Exploit, Third Party Advisory
References () https://www.kb.cert.org/vuls/id/307983 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/307983 - Third Party Advisory, US Government Resource

Information

Published : 2018-06-11 17:29

Updated : 2024-11-21 03:25


NVD link : CVE-2017-3208

Mitre link : CVE-2017-3208

CVE.ORG link : CVE-2017-3208


JSON object : View

Products Affected

themidnightcoders

  • weborb_for_java
CWE
CWE-611

Improper Restriction of XML External Entity Reference