CVE-2010-3260
Published Apr 27, 2011
Last updated 13 years ago
Overview
- Description
- oxf/xml/xerces/XercesSAXParserFactoryImpl.java in the xforms-server component in the XForms service in Orbeon Forms before 3.9 does not properly restrict DTDs in Ajax requests, which allows remote attackers to read arbitrary files or send HTTP requests to intranet servers via an entity declaration in conjunction with an entity reference, related to an "XML injection" issue.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:orbeon:forms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "798EC351-2AAD-4A0B-BE2D-3C19619E5C01", "versionEndIncluding": "3.8.1" }, { "criteria": "cpe:2.3:a:orbeon:forms:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEAF5333-3642-4AAE-B45A-EE55E9AE44F0" }, { "criteria": "cpe:2.3:a:orbeon:forms:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3B51BD7-5979-424D-AD9F-43C9FD924820" }, { "criteria": "cpe:2.3:a:orbeon:forms:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91A7C1BB-A6A7-44FA-A4FC-52E10EE7E07D" }, { "criteria": "cpe:2.3:a:orbeon:forms:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0E4787B-0E65-412B-999D-1F0BB4ACDE68" }, { "criteria": "cpe:2.3:a:orbeon:forms:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE75ED9C-AA98-4822-9E6F-556D4CCC6FFF" }, { "criteria": "cpe:2.3:a:orbeon:forms:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAB9C35A-8BB9-4026-A32E-6B68CBA6B81B" }, { "criteria": "cpe:2.3:a:orbeon:forms:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77E21DF5-A905-4ABC-B0C5-F42A24C8F66B" }, { "criteria": "cpe:2.3:a:orbeon:forms:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "836C4838-7C56-4D48-AF09-46243FA0A0AF" }, { "criteria": "cpe:2.3:a:orbeon:forms:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48981C56-EE58-4C9E-A5DE-1B8A89955940" }, { "criteria": "cpe:2.3:a:orbeon:forms:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0437EF7F-7FB3-493A-AEAF-1595EA7A9EE5" }, { "criteria": "cpe:2.3:a:orbeon:forms:3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "247C2513-62C5-4DEE-8FA4-960E2C2304E1" }, { "criteria": "cpe:2.3:a:orbeon:forms:3.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E425309-EAED-4EDE-AE65-0FBB9EC6B0C4" }, { "criteria": "cpe:2.3:a:orbeon:forms:3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D26DAB37-6BAA-49E2-938D-DF718D804D04" } ], "operator": "OR" } ] } ]