CVE-2019-15160

The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
References
Link Resource
https://github.com/kbrw/sweet_xml/issues/71 Exploit Third Party Advisory
https://hex.pm/packages/sweet_xml Third Party Advisory
https://github.com/kbrw/sweet_xml/issues/71 Exploit Third Party Advisory
https://hex.pm/packages/sweet_xml Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:kbrw:sweet_xml:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:28

Type Values Removed Values Added
References () https://github.com/kbrw/sweet_xml/issues/71 - Exploit, Third Party Advisory () https://github.com/kbrw/sweet_xml/issues/71 - Exploit, Third Party Advisory
References () https://hex.pm/packages/sweet_xml - Third Party Advisory () https://hex.pm/packages/sweet_xml - Third Party Advisory

Information

Published : 2019-08-19 06:15

Updated : 2024-11-21 04:28


NVD link : CVE-2019-15160

Mitre link : CVE-2019-15160

CVE.ORG link : CVE-2019-15160


JSON object : View

Products Affected

kbrw

  • sweet_xml
CWE
CWE-776

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')