{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2020-36641","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-05T11:28:00.305Z","datePublished":"2023-01-05T11:29:57.735Z","dateUpdated":"2024-08-04T17:30:08.461Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T20:56:59.661Z"},"title":"gturri aXMLRPC ResponseParser.java ResponseParser xml external entity reference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-611","lang":"en","description":"CWE-611 XML External Entity Reference"}]}],"affected":[{"vendor":"gturri","product":"aXMLRPC","versions":[{"version":"1.0","status":"affected"},{"version":"1.1","status":"affected"},{"version":"1.2","status":"affected"},{"version":"1.3","status":"affected"},{"version":"1.4","status":"affected"},{"version":"1.5","status":"affected"},{"version":"1.6","status":"affected"},{"version":"1.7","status":"affected"},{"version":"1.8","status":"affected"},{"version":"1.9","status":"affected"},{"version":"1.10","status":"affected"},{"version":"1.11","status":"affected"},{"version":"1.12","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in gturri aXMLRPC up to 1.12.0. This vulnerability affects the function ResponseParser of the file src/main/java/de/timroes/axmlrpc/ResponseParser.java. The manipulation leads to xml external entity reference. Upgrading to version 1.14.0 is able to address this issue. The patch is identified as 456752ebc1ef4c0db980cb5b01a0b3cd0a9e0bae. It is recommended to upgrade the affected component. VDB-217450 is the identifier assigned to this vulnerability."},{"lang":"de","value":"In gturri aXMLRPC bis 1.12.0 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Es geht um die Funktion ResponseParser der Datei src/main/java/de/timroes/axmlrpc/ResponseParser.java. Mit der Manipulation mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 1.14.0 vermag dieses Problem zu lösen. Der Patch wird als 456752ebc1ef4c0db980cb5b01a0b3cd0a9e0bae bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.9,"vectorString":"AV:A/AC:M/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-05T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-02-13T21:57:56.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"gturri (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.217450","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217450","tags":["signature","permissions-required"]},{"url":"https://github.com/gturri/aXMLRPC/commit/456752ebc1ef4c0db980cb5b01a0b3cd0a9e0bae","tags":["patch"]},{"url":"https://github.com/gturri/aXMLRPC/releases/tag/aXMLRPC-1.14.0","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T17:30:08.461Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217450","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217450","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/gturri/aXMLRPC/commit/456752ebc1ef4c0db980cb5b01a0b3cd0a9e0bae","tags":["patch","x_transferred"]},{"url":"https://github.com/gturri/aXMLRPC/releases/tag/aXMLRPC-1.14.0","tags":["patch","x_transferred"]}]}]}}