9.8
CVSSv3

CVE-2017-12621

Published: 28/09/2017 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

During Jelly (xml) file parsing with Apache Xerces, if a custom doctype entity is declared with a "SYSTEM" entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lead to XML External Entity (XXE) attacks in Apache Commons Jelly prior to 1.0.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache commons jelly

Github Repositories

Getting started with open source contributions slides.

Getting started with OSS <section> <h2>Getting Started With Open Source Contributions</h2> <h4>A good career move</h4> <br> <small>Created by <a href="githubcom/chtompki"> Rob Tompkins (chtompki)&

Talk to DC Apache Roadshow March 2019

Getting started with OSS <section> <h2>Getting Started With Open Source Contributions</h2> <h4>A good career move</h4> <br> <small>Created by <a href="githubcom/chtompki"> Rob Tompkins (chtompki)&