XML External Entity (XXE) Injection

Affecting libxml2 package, versions <2.9.1+dfsg1-5+deb8u5

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).

References

CVSS Score

9.8
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE
CVE-2017-7375
CWE
CWE-611
Snyk ID
SNYK-DEBIAN8-LIBXML2-429309
Disclosed
19 Feb, 2018
Published
19 Feb, 2018