You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
XmlParser is vulnerable to XML external entity (XXE) vulnerability.
XmlParser is being used when parsing Jetty’s xml configuration files. An attacker might exploit this vulnerability in order to achieve SSRF or cause a denial of service. One possible scenario is importing a (remote) malicious WAR into a Jetty’s server, while the WAR includes a malicious web.xml. The vulnerability is patched in versions 10.0.16, 11.0.16, and 12.0.0.
WS-2023-0236 - Low Severity Vulnerability
The jetty xml utilities.
Library home page: https://eclipse.org/jetty
Path to dependency file: /webgoat-lessons/xxe/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-xml/9.4.36.v20210114/jetty-xml-9.4.36.v20210114.jar
Dependency Hierarchy:
Found in HEAD commit: f18e43fbc2d56c28b38b6d440d202f7327efd240
Found in base branch: develop
XmlParser is vulnerable to XML external entity (XXE) vulnerability.
XmlParser is being used when parsing Jetty’s xml configuration files. An attacker might exploit this vulnerability in order to achieve SSRF or cause a denial of service. One possible scenario is importing a (remote) malicious WAR into a Jetty’s server, while the WAR includes a malicious web.xml. The vulnerability is patched in versions 10.0.16, 11.0.16, and 12.0.0.
Publish Date: 2023-07-10
URL: WS-2023-0236
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-58qw-p7qm-5rvh
Release Date: 2023-07-10
Fix Resolution: org.eclipse.jetty:jetty-xml:10.0.16,11.0.16,12.0.0
The text was updated successfully, but these errors were encountered: