Lucene search

K
mageiaGentoo FoundationMGASA-2015-0242
HistoryJun 09, 2015 - 12:17 a.m.

Updated jackrabbit packages fix CVE-2015-1833

2015-06-0900:17:51
Gentoo Foundation
advisories.mageia.org
20

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.019 Low

EPSS

Percentile

88.6%

Updated jackrabbit packages fix security vulnerability: In Apache Jackrabbit before 2.4.6, When processing a WebDAV request body containing XML, the XML parser can be instructed to read content from network resources accessible to the host, identified by URI schemes such as “http(s)” or “file”. Depending on the WebDAV request, this can not only be used to trigger internal network requests, but might also be used to insert said content into the request, potentially exposing it to the attacker and others (for instance, by inserting said content in a WebDAV property value using a PROPPATCH request). See also IETF RFC 4918, Section 20.6 (CVE-2015-1833).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchjackrabbit< 2.4.2-6.1jackrabbit-2.4.2-6.1.mga4

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.019 Low

EPSS

Percentile

88.6%