Upstream information

CVE-2022-2414 at MITRE

Description

Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
CVSSv3 Version 3.1
No SUSE Bugzilla entries cross referenced.

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Liberty Linux 7
  • pki-base >= 10.5.18-24.el7_9
  • pki-base-java >= 10.5.18-24.el7_9
  • pki-ca >= 10.5.18-24.el7_9
  • pki-javadoc >= 10.5.18-24.el7_9
  • pki-kra >= 10.5.18-24.el7_9
  • pki-server >= 10.5.18-24.el7_9
  • pki-symkey >= 10.5.18-24.el7_9
  • pki-tools >= 10.5.18-24.el7_9
Patchnames:
RHSA-2022:8799
SUSE Liberty Linux 8
  • apache-commons-collections >= 3.2.2-10.module+el8.1.0+3366+6dfb954c
  • apache-commons-lang >= 2.6-21.module+el8.1.0+3366+6dfb954c
  • apache-commons-net >= 3.6-3.module+el8.3.0+6805+72837426
  • bea-stax-api >= 1.2.0-16.module+el8.1.0+3366+6dfb954c
  • glassfish-fastinfoset >= 1.2.13-9.module+el8.1.0+3366+6dfb954c
  • glassfish-jaxb-api >= 2.2.12-8.module+el8.1.0+3366+6dfb954c
  • glassfish-jaxb-core >= 2.2.11-11.module+el8.1.0+3366+6dfb954c
  • glassfish-jaxb-runtime >= 2.2.11-11.module+el8.1.0+3366+6dfb954c
  • glassfish-jaxb-txw2 >= 2.2.11-11.module+el8.1.0+3366+6dfb954c
  • idm-pki-acme >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • idm-pki-base >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • idm-pki-base-java >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • idm-pki-ca >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • idm-pki-kra >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • idm-pki-server >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • idm-pki-symkey >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • idm-pki-tools >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • jackson-annotations >= 2.10.0-1.module+el8.2.0+5059+3eb3af25
  • jackson-core >= 2.10.0-1.module+el8.2.0+5059+3eb3af25
  • jackson-databind >= 2.10.0-1.module+el8.2.0+5059+3eb3af25
  • jackson-jaxrs-json-provider >= 2.9.9-1.module+el8.1.0+3832+9784644d
  • jackson-jaxrs-providers >= 2.9.9-1.module+el8.1.0+3832+9784644d
  • jackson-module-jaxb-annotations >= 2.7.6-4.module+el8.1.0+3366+6dfb954c
  • jakarta-commons-httpclient >= 3.1-28.module+el8.1.0+3366+6dfb954c
  • javassist >= 3.18.1-8.module+el8.1.0+3366+6dfb954c
  • javassist-javadoc >= 3.18.1-8.module+el8.1.0+3366+6dfb954c
  • jss >= 4.9.4-1.module+el8.7.0+15532+95bac9ee
  • jss-javadoc >= 4.9.4-1.module+el8.7.0+15532+95bac9ee
  • ldapjdk >= 4.23.0-1.module+el8.5.0+11983+6ba118b4
  • ldapjdk-javadoc >= 4.23.0-1.module+el8.5.0+11983+6ba118b4
  • pki-servlet-4.0-api >= 9.0.50-1.module+el8.7.0+15761+f86c9a56
  • pki-servlet-engine >= 9.0.50-1.module+el8.7.0+15761+f86c9a56
  • python-nss-doc >= 1.0.1-10.module+el8.1.0+3366+6dfb954c
  • python3-idm-pki >= 10.12.0-4.module+el8.7.0+16126+c5918a27
  • python3-nss >= 1.0.1-10.module+el8.1.0+3366+6dfb954c
  • relaxngDatatype >= 2011.1-7.module+el8.1.0+3366+6dfb954c
  • resteasy >= 3.0.26-6.module+el8.4.0+8891+bb8828ef
  • slf4j >= 1.7.25-4.module+el8.1.0+3366+6dfb954c
  • slf4j-jdk14 >= 1.7.25-4.module+el8.1.0+3366+6dfb954c
  • stax-ex >= 1.7.7-8.module+el8.2.0+5723+4574fbff
  • tomcatjss >= 7.7.1-1.module+el8.6.0+13291+248751b1
  • velocity >= 1.7-24.module+el8.1.0+3366+6dfb954c
  • xalan-j2 >= 2.7.1-38.module+el8.1.0+3366+6dfb954c
  • xerces-j2 >= 2.11.0-34.module+el8.1.0+3366+6dfb954c
  • xml-commons-apis >= 1.4.01-25.module+el8.1.0+3366+6dfb954c
  • xml-commons-resolver >= 1.2-26.module+el8.1.0+3366+6dfb954c
  • xmlstreambuffer >= 1.5.4-8.module+el8.2.0+5723+4574fbff
  • xsom >= 0-19.20110809svn.module+el8.1.0+3366+6dfb954c
Patchnames:
RHSA-2022:7470
SUSE Liberty Linux 9
  • pki-acme >= 11.0.6-2.el9_0
  • pki-base >= 11.0.6-2.el9_0
  • pki-base-java >= 11.0.6-2.el9_0
  • pki-ca >= 11.0.6-2.el9_0
  • pki-kra >= 11.0.6-2.el9_0
  • pki-server >= 11.0.6-2.el9_0
  • pki-symkey >= 11.0.6-2.el9_0
  • pki-tools >= 11.0.6-2.el9_0
  • python3-pki >= 11.0.6-2.el9_0
Patchnames:
RHSA-2022:7326


SUSE Timeline for this CVE

CVE page created: Thu Jul 14 22:00:08 2022
CVE page last modified: Mon Oct 30 18:15:36 2023