CVE编号
CVE-2018-1000632利用情况
暂无补丁情况
官方补丁披露时间
2018-08-21漏洞描述
版本2.1.1之前的dom4j版本在Class: Element中包含一个CWE-91: XML注入漏洞。方法:addElement、addAttribute,它们会导致攻击者通过XML注入篡改XML文档。这种攻击似乎可以通过攻击者在XML文档中指定属性或元素来利用。这个漏洞似乎在2.1.1或更高版本中已经修复。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://access.redhat.com/errata/RHSA-2019:0362 | |
https://access.redhat.com/errata/RHSA-2019:0364 | |
https://access.redhat.com/errata/RHSA-2019:0365 | |
https://access.redhat.com/errata/RHSA-2019:0380 | |
https://access.redhat.com/errata/RHSA-2019:1159 | |
https://access.redhat.com/errata/RHSA-2019:1160 | |
https://access.redhat.com/errata/RHSA-2019:1161 | |
https://access.redhat.com/errata/RHSA-2019:1162 | |
https://access.redhat.com/errata/RHSA-2019:3172 | |
https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387 | |
https://github.com/dom4j/dom4j/issues/48 | |
https://ihacktoprotect.com/post/dom4j-xml-injection/ | |
https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e2... | |
https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8... | |
https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4... | |
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9... | |
https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161... | |
https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd... | |
https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44... | |
https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bc... | |
https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c... | |
https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://security.netapp.com/advisory/ntap-20190530-0001/ | |
https://www.oracle.com/security-alerts/cpuapr2020.html | |
https://www.oracle.com/security-alerts/cpuApr2021.html | |
https://www.oracle.com/security-alerts/cpujul2020.html | |
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | dom4j_project | dom4j | * |
From (including) 2.0.0 |
Up to (excluding) 2.0.3 |
||||
运行在以下环境 | |||||||||
应用 | dom4j_project | dom4j | * |
From (including) 2.1.0 |
Up to (excluding) 2.1.1 |
||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_workflow_automation | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snapcenter | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snapmanager | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snap_creator_framework | - | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | flexcube_investor_servicing | 12.0.4 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | flexcube_investor_servicing | 12.1.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | flexcube_investor_servicing | 12.3.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | flexcube_investor_servicing | 12.4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | flexcube_investor_servicing | 14.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * |
From (including) 16.1.0.0 |
Up to (including) 16.2.20.1 |
||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * |
From (including) 17.1.0.0 |
Up to (including) 17.12.17.1 |
||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * |
From (including) 18.1.0.0 |
Up to (including) 18.8.19.0 |
||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * |
From (including) 19.12.0.0 |
Up to (including) 19.12.6.0 |
||||
运行在以下环境 | |||||||||
应用 | oracle | rapid_planning | 12.1 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | rapid_planning | 12.2 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | retail_integration_bus | 15.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | retail_integration_bus | 16.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | utilities_framework | * |
From (including) 4.3.0.2.0 |
Up to (including) 4.3.0.6.0 |
||||
运行在以下环境 | |||||||||
应用 | oracle | utilities_framework | 2.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | utilities_framework | 4.2.0.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | utilities_framework | 4.2.0.3.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | utilities_framework | 4.4.0.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | utilities_framework | 4.4.0.2 | - | |||||
运行在以下环境 | |||||||||
应用 | redhat | jboss_enterprise_application_platform | 6.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | redhat | jboss_enterprise_application_platform | 6.4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | redhat | jboss_enterprise_application_platform | 7.1.0 | - | |||||
运行在以下环境 | |||||||||
应用 | redhat | satellite | 6.6 | - | |||||
运行在以下环境 | |||||||||
应用 | redhat | satellite_capsule | 6.6 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_8 | dom4j | * |
Up to (excluding) 1.6.1+dfsg.3-2+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | dom4j | * |
Up to (excluding) 1.6.1+dfsg.3-2+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_33 | dom4j | * |
Up to (excluding) 2.0.3-1.fc33 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_34 | dom4j | * |
Up to (excluding) 2.0.3-1.fc34 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | dom4j | * |
Up to (excluding) 1.6.1-lp150.3.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | dom4j | * |
Up to (excluding) 1.6.1-31.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | dom4j | * |
Up to (excluding) 1.6.1+dfsg.3-2ubuntu1.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | dom4j | * |
Up to (excluding) 2.1.1-1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_21.04 | dom4j | * |
Up to (excluding) 2.1.1-1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...