Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-15691 |
CWE-ID | CWE-611 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
uimaj Web applications / CMS uima-as Web applications / CMS uimaFIT Web applications / CMS uimaDUCC Web applications / CMS |
Vendor | Apache Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU12328
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-15691
CWE-ID:
CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.
The weakness exists due to improper restriction of XML External Entity (XXE) references. A remote attacker can trick the victim into opening a specially crafted XML document that submits malicious XML entities that are parsed by the XML parser, gain access to potentially sensitive information, such as local files or other internal information.
Update Apache uimaj to 2.10.2 or 3.0.0-beta, Apache uima-as to 2.10.2, Apache uimaFIT to 2.4.0, Apache uimaDUCC to 2.2.2.
Vulnerable software versionsuimaj: 2.1 - 3.0.0 alpha02
uima-as: 2.4 - 2.9
uimaFIT: 2.0 - 2.3.1
uimaDUCC: 1.0 - 2.2.1
External linkshttp://uima.apache.org/security_report#CVE-2017-15691
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.