CVE-2013-0340
Published Jan 21, 2014
Last updated a year ago
Overview
- Description
- expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-611
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD57EC4F-6A20-494B-B8B0-8F6D680A8B4E", "versionEndExcluding": "2.4.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB4BD62D-51E9-4A96-8E14-DAF13377BF02", "versionEndExcluding": "3.6.15", "versionStartIncluding": "3.6.0" }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "234D4B65-0CBA-4C21-B358-C8FC9CE73E5F", "versionEndExcluding": "3.7.12", "versionStartIncluding": "3.7.0" }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AECFC6AC-5ECE-45F8-97F2-6D8D33C49F80", "versionEndExcluding": "3.8.12", "versionStartIncluding": "3.8.0" }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5077256-B9A6-4BC1-A7F3-8E3220355FF0", "versionEndExcluding": "3.9.7", "versionStartIncluding": "3.9.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCD67B72-0B1D-46A8-A149-8149ED749FEC", "versionEndExcluding": "14.8" }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56F86481-D995-43D7-982F-5DC6E4682A65", "versionEndExcluding": "14.8" }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F52D69C-8621-4E01-ABDE-8473A590BCB6", "versionEndExcluding": "11.6" }, { "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B32A978E-673C-421D-93A1-CA84D90B67E4", "versionEndExcluding": "15.0" }, { "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5364285F-B3F2-465B-B738-2FC1C8913A44", "versionEndExcluding": "8.0" } ], "operator": "OR" } ] } ]