Improper Restriction of XML External Entity Reference in Castor
Moderate severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jun 11, 2014
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jul 7, 2022
Last updated
Jan 27, 2023
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
References