Vulnerability identifier: #VU12328
Vulnerability risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-611
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
uimaj
Web applications /
CMS
uima-as
Web applications /
CMS
uimaFIT
Web applications /
CMS
uimaDUCC
Web applications /
CMS
Vendor: Apache Foundation
Description
The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.
The weakness exists due to improper restriction of XML External Entity (XXE) references. A remote attacker can trick the victim into opening a specially crafted XML document that submits malicious XML entities that are parsed by the XML parser, gain access to potentially sensitive information, such as local files or other internal information.
Mitigation
Update Apache uimaj to 2.10.2 or 3.0.0-beta, Apache uima-as to 2.10.2, Apache uimaFIT to 2.4.0, Apache uimaDUCC to 2.2.2.
Vulnerable software versions
uimaj: 2.1 - 3.0.0 alpha02
uima-as: 2.4 - 2.9
uimaFIT: 2.0 - 2.3.1
uimaDUCC: 1.0 - 2.2.1
External links
http://uima.apache.org/security_report#CVE-2017-15691
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.