Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java.
References
Link | Resource |
---|---|
https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-4.0.3 | Patch Third Party Advisory |
https://github.com/Bedework/bw-webdav/pull/1 | Patch Third Party Advisory |
https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-4.0.3 | Patch Third Party Advisory |
https://github.com/Bedework/bw-webdav/pull/1 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-4.0.3 - Patch, Third Party Advisory | |
References | () https://github.com/Bedework/bw-webdav/pull/1 - Patch, Third Party Advisory |
Information
Published : 2018-12-10 02:29
Updated : 2024-11-21 04:00
NVD link : CVE-2018-20000
Mitre link : CVE-2018-20000
CVE.ORG link : CVE-2018-20000
JSON object : View
Products Affected
apereo
- bw-webdav
CWE
CWE-611
Improper Restriction of XML External Entity Reference