libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2016-9318 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 5.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:P/I:N/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | Partial |
CVSS3 Base Score | 6.7 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L |
Attack Vector | Local |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity Impact | None |
Availability Impact | Low |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat JBoss Core Services 1 | RHSA-2018:2486 | 2018-08-16 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | libxml2 | Will not fix |
Red Hat Enterprise Linux 6 | libxml2 | Will not fix |
Red Hat Enterprise Linux 5 | libxml2 | Will not fix |
Application parsing untrusted input with libxml2 should be careful to NOT use entity expansion (enabled by XML_PARSE_NOENT) or DTD validation (XML_PARSE_DTDLOAD, XML_PARSE_DTDVALID) on such input.