The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
References
Link | Resource |
---|---|
https://github.com/kbrw/sweet_xml/issues/71 | Exploit Third Party Advisory |
https://hex.pm/packages/sweet_xml | Third Party Advisory |
https://github.com/kbrw/sweet_xml/issues/71 | Exploit Third Party Advisory |
https://hex.pm/packages/sweet_xml | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kbrw/sweet_xml/issues/71 - Exploit, Third Party Advisory | |
References | () https://hex.pm/packages/sweet_xml - Third Party Advisory |
Information
Published : 2019-08-19 06:15
Updated : 2024-11-21 04:28
NVD link : CVE-2019-15160
Mitre link : CVE-2019-15160
CVE.ORG link : CVE-2019-15160
JSON object : View
Products Affected
kbrw
- sweet_xml
CWE
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')