CVE-2018-1000889

Logisim Evolution version 2.14.3 and earlier contains an XML External Entity (XXE) vulnerability in Circuit file loading functionality (loadXmlFrom in src/com/cburch/logisim/file/XmlReader.java) that can result in information leak, possible RCE depending on system configuration. This attack appears to be exploitable via the victim opening a specially crafted circuit file. This vulnerability appears to have been fixed in 2.14.4.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:logisim-evolution_project:logisim-evolution:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:40

Type Values Removed Values Added
References () https://github.com/reds-heig/logisim-evolution/pull/139 - Patch, Third Party Advisory () https://github.com/reds-heig/logisim-evolution/pull/139 - Patch, Third Party Advisory
References () https://www.kvakil.me/posts/logisim/ - Third Party Advisory () https://www.kvakil.me/posts/logisim/ - Third Party Advisory

Information

Published : 2018-12-28 16:29

Updated : 2024-11-21 03:40


NVD link : CVE-2018-1000889

Mitre link : CVE-2018-1000889

CVE.ORG link : CVE-2018-1000889


JSON object : View

Products Affected

logisim-evolution_project

  • logisim-evolution
CWE
CWE-611

Improper Restriction of XML External Entity Reference