5
CVSSv2

CVE-2013-6440

Published: 14/02/2014 Updated: 07/02/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java prior to 2.6.1 set the expandEntityReferences property to true, which allows remote malicious users to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.

Vulnerable Product Search on Vulmon Subscribe to Product

internet2 opensaml 2.2.0

internet2 opensaml 2.1.0

shibboleth opensaml 2.4.3

shibboleth opensaml 2.4.2

shibboleth opensaml 2.5.3

shibboleth opensaml

shibboleth opensaml 2.5.1

shibboleth opensaml 2.5.0

internet2 opensaml 2.0

shibboleth opensaml 2.5.2

shibboleth opensaml 2.4.1

shibboleth opensaml 2.4.0

Vendor Advisories

It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks ...