Lucene search

K
cvelistVulDBCVELIST:CVE-2023-3276
HistoryJun 15, 2023 - 1:00 p.m.

CVE-2023-3276 Dromara HuTool XML Parsing Module XmlUtil.java readBySax xml external entity reference

2023-06-1513:00:03
CWE-611
VulDB
www.cve.org
2
xml parsing module
xmlutil.java
xml external entity reference
vdb-231626

CVSS2

5.2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

CVSS3

5.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

45.6%

A vulnerability, which was classified as problematic, has been found in Dromara HuTool up to 5.8.19. Affected by this issue is the function readBySax of the file XmlUtil.java of the component XML Parsing Module. The manipulation leads to xml external entity reference. The exploit has been disclosed to the public and may be used. VDB-231626 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CNA Affected

[
  {
    "vendor": "Dromara",
    "product": "HuTool",
    "versions": [
      {
        "version": "5.8.0",
        "status": "affected"
      },
      {
        "version": "5.8.1",
        "status": "affected"
      },
      {
        "version": "5.8.2",
        "status": "affected"
      },
      {
        "version": "5.8.3",
        "status": "affected"
      },
      {
        "version": "5.8.4",
        "status": "affected"
      },
      {
        "version": "5.8.5",
        "status": "affected"
      },
      {
        "version": "5.8.6",
        "status": "affected"
      },
      {
        "version": "5.8.7",
        "status": "affected"
      },
      {
        "version": "5.8.8",
        "status": "affected"
      },
      {
        "version": "5.8.9",
        "status": "affected"
      },
      {
        "version": "5.8.10",
        "status": "affected"
      },
      {
        "version": "5.8.11",
        "status": "affected"
      },
      {
        "version": "5.8.12",
        "status": "affected"
      },
      {
        "version": "5.8.13",
        "status": "affected"
      },
      {
        "version": "5.8.14",
        "status": "affected"
      },
      {
        "version": "5.8.15",
        "status": "affected"
      },
      {
        "version": "5.8.16",
        "status": "affected"
      },
      {
        "version": "5.8.17",
        "status": "affected"
      },
      {
        "version": "5.8.18",
        "status": "affected"
      },
      {
        "version": "5.8.19",
        "status": "affected"
      }
    ],
    "modules": [
      "XML Parsing Module"
    ]
  }
]

CVSS2

5.2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

CVSS3

5.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

45.6%

Related for CVELIST:CVE-2023-3276