7.5
CVSSv3

CVE-2021-33813

Published: 16/06/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An XXE issue in SAXBuilder in JDOM up to and including 2.0.6 allows malicious users to cause a denial of service via a crafted HTTP request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jdom jdom

apache solr 8.8.1

apache solr 8.9

apache tika 1.25

debian debian linux 9.0

fedoraproject fedora 35

oracle communications messaging server 8.1

Vendor Advisories

Debian Bug report logs - #990671 libjdom2-java: CVE-2021-33813 Package: src:libjdom2-java; Maintainer for src:libjdom2-java is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 4 Jul 2021 12:36:02 UTC Severity: important Tags: sec ...
Synopsis Important: Red Hat Integration Camel-K 164 release and security update Type/Severity Security Advisory: Important Topic A micro version update (from 163 to 164) is now available for Red Hat Integration Camel K that includes bug fixes and enhancements The purpose of this text-only errata is to inform you about the security issu ...
Synopsis Moderate: Red Hat Decision Manager 7121 security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat Decision ManagerRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed sever ...
Synopsis Moderate: Red Hat Process Automation Manager 7121 security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat Process Automation ManagerRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gi ...
Synopsis Important: Red Hat Fuse 7110 release and security update Type/Severity Security Advisory: Important Topic A minor version update (from 710 to 711) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security has rated this update ...
An XXE issue in SAXBuilder in JDOM through 206 allows attackers to cause a denial of service via a crafted HTTP request (CVE-2021-33813) ...
An XXE issue in SAXBuilder in JDOM through 206 allows attackers to cause a denial of service via a crafted HTTP request ...
An XXE issue in SAXBuilder in JDOM through 206 allows attackers to cause a denial of service via a crafted HTTP request (CVE-2021-33813) ...
An XXE issue in SAXBuilder in JDOM through 206 allows attackers to cause a denial of service via a crafted HTTP request (CVE-2021-33813) ...

Github Repositories

Programming Research Plugin

Maintained by Intellectual Property Update The PRQA product has become Helix QAC and Programming Research has become a Perforce company As such, the PRQA plugin (now called Helix-QAC Plugin) has changed cosmetically to reflect this There may be a dedicated Helix-QAC plugin at a suitable GitHub location in the future If one is created, it will be linked to from here Intro

References

CWE-611https://github.com/hunterhacker/jdom/pull/188https://github.com/hunterhacker/jdom/releaseshttps://alephsecurity.com/vulns/aleph-2021003https://lists.debian.org/debian-lts-announce/2021/06/msg00026.htmlhttps://lists.debian.org/debian-lts-announce/2021/07/msg00012.htmlhttps://www.oracle.com/security-alerts/cpuapr2022.htmlhttps://www.oracle.com/security-alerts/cpujul2022.htmlhttps://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6%40%3Cissues.solr.apache.org%3Ehttps://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f%40%3Cissues.solr.apache.org%3Ehttps://lists.apache.org/thread.html/r89b3800cfabb1e773e49425e5d4239c28a659839a2eca6af3431482e%40%3Cissues.solr.apache.org%3Ehttps://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd%40%3Cdev.tika.apache.org%3Ehttps://lists.apache.org/thread.html/r845e987b7cd8efe610284958e997b84583f5a98d3394adc09e3482fe%40%3Cissues.solr.apache.org%3Ehttps://lists.apache.org/thread.html/r5674106135bb1a6ef57483f4c63a9c44bca85d0e2a8a05895a8f1d89%40%3Cissues.solr.apache.org%3Ehttps://lists.apache.org/thread.html/r6db397ae7281ead825338200d1f62d2827585a70797cc9ac0c4bd23f%40%3Cissues.solr.apache.org%3Ehttps://lists.apache.org/thread.html/r21c406c7ed88fe340db7dbae75e58355159e6c324037c7d5547bf40b%40%3Cissues.solr.apache.org%3Ehttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AH46QHE5GIMT6BL6C3GDTOYF27JYILXM/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990671https://nvd.nist.govhttps://github.com/jenkinsci/prqa-pluginhttps://alas.aws.amazon.com/AL2/ALAS-2023-2045.html