XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.debian.org/security/2015/dsa-3298 | vendor advisory |
http://www.securityfocus.com/bid/74761 | vdb entry |
https://www.exploit-db.com/exploits/37110/ | exploit |
http://mail-archives.apache.org/mod_mbox/jackrabbit-announce/201505.mbox/%3C555DA644.8080908%40greenbytes.de%3E | vendor advisory mailing list |
http://www.securityfocus.com/archive/1/535582/100/0/threaded | mailing list |
http://www.apache.org/dist/jackrabbit/2.10.1/RELEASE-NOTES.txt | vendor advisory |
https://issues.apache.org/jira/browse/JCR-3883 | vendor advisory |
http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html |