4.3
CVSSv2

CVE-2014-3529

Published: 04/09/2014 Updated: 29/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The OPC SAX setup in Apache POI prior to 3.10.1 allows remote malicious users to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache poi 3.10

apache poi 3.9

apache poi 3.7

apache poi 3.5

apache poi 3.0.2

apache poi 2.5

apache poi 2.0

apache poi 1.5.1

apache poi 1.5

apache poi 0.7

apache poi 0.6

apache poi 0.12.0

apache poi 0.11.0

apache poi 0.10.0

apache poi 3.8

apache poi 3.1

apache poi 3.0

apache poi 1.1.0

apache poi 1.0.2

apache poi 0.3

apache poi 0.2

apache poi

apache poi 2.5.1

apache poi 1.8

apache poi 1.7

apache poi 1.0.1

apache poi 1.0.0

apache poi 0.14.0

apache poi 0.13.0

apache poi 3.6

apache poi 3.2

apache poi 3.0.1

apache poi 1.2.0

apache poi 1.10

apache poi 0.5

apache poi 0.4

apache poi 0.1

Vendor Advisories

It was found that Apache POI would resolve entities in OOXML documents A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform more advanced XML External Entity (XXE) attacks ...