CVE-2024-23525

The Spreadsheet::ParseXLSX package before 0.30 for Perl allows XXE attacks because it neglects to use the no_xxe option of XML::Twig.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tozt:spreadsheet\:\:parsexlsx:*:*:*:*:*:perl:*:*

History

21 Nov 2024, 08:57

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/01/18/4 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2024/01/18/4 - Exploit, Mailing List, Third Party Advisory
References () https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a - Exploit, Third Party Advisory () https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a - Exploit, Third Party Advisory
References () https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10 - Issue Tracking () https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10 - Issue Tracking
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00018.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00018.html -
References () https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes - Release Notes () https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes - Release Notes
References () https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html - () https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html -

05 May 2024, 15:15

Type Values Removed Values Added
References
  • () https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html -

27 Jan 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00018.html -

25 Jan 2024, 01:42

Type Values Removed Values Added
First Time Tozt spreadsheet\
Tozt
CPE cpe:2.3:a:tozt:spreadsheet\:\:parsexlsx:*:*:*:*:*:perl:*:*
CWE CWE-611
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () http://www.openwall.com/lists/oss-security/2024/01/18/4 - () http://www.openwall.com/lists/oss-security/2024/01/18/4 - Exploit, Mailing List, Third Party Advisory
References () https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a - () https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a - Exploit, Third Party Advisory
References () https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10 - () https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10 - Issue Tracking
References () https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes - () https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes - Release Notes

18 Jan 2024, 12:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/18/4 -

18 Jan 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-18 00:15

Updated : 2024-11-21 08:57


NVD link : CVE-2024-23525

Mitre link : CVE-2024-23525

CVE.ORG link : CVE-2024-23525


JSON object : View

Products Affected

tozt

  • spreadsheet\
CWE
CWE-611

Improper Restriction of XML External Entity Reference