CVE-2017-5661

In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:formatting_objects_processor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.debian.org/security/2017/dsa-3864 - () http://www.debian.org/security/2017/dsa-3864 -
References () http://www.securityfocus.com/bid/97947 - () http://www.securityfocus.com/bid/97947 -
References () https://www.tenable.com/security/tns-2021-14 - () https://www.tenable.com/security/tns-2021-14 -
References () https://xmlgraphics.apache.org/security.html - Patch, Vendor Advisory () https://xmlgraphics.apache.org/security.html - Patch, Vendor Advisory

Information

Published : 2017-04-18 14:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5661

Mitre link : CVE-2017-5661

CVE.ORG link : CVE-2017-5661


JSON object : View

Products Affected

apache

  • formatting_objects_processor
CWE
CWE-611

Improper Restriction of XML External Entity Reference