低危 dom4j 代码问题漏洞
CVE编号
CVE-2020-10683利用情况
暂无补丁情况
官方补丁披露时间
2020-05-02漏洞描述
dom4j是一款用于处理XML的开源框架。dom4j 2.0.3之前版本和2.1.3之前的2.1.x版本中存在XML外部实体注入漏洞。该漏洞源于默认允许外部DTD和外部实体。攻击者可利用该漏洞进行XML外部实体注入攻击。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/dom4j/dom4j/commit/a822852受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | dom4j_project | dom4j | * | From (including) 2.0.0 | Up to (excluding) 2.0.3 | ||||
运行在以下环境 | |||||||||
应用 | dom4j_project | dom4j | * | From (including) 2.1.0 | Up to (excluding) 2.1.3 | ||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_api_services | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_workflow_automation | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snapcenter | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snapmanager | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snap_creator_framework | - | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * | From (including) 16.1.0.0 | Up to (including) 16.2.20.1 | ||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * | From (including) 17.1.0.0 | Up to (including) 17.12.17.1 | ||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * | From (including) 18.1.0.0 | Up to (including) 18.8.19.0 | ||||
运行在以下环境 | |||||||||
应用 | oracle | primavera_p6_enterprise_project_portfolio_management | * | From (including) 19.12.0.0 | Up to (including) 19.12.6.0 | ||||
运行在以下环境 | |||||||||
应用 | oracle | rapid_planning | 12.1 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | rapid_planning | 12.2 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | retail_integration_bus | 15.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | retail_integration_bus | 16.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | dom4j | * | Up to (including) 2.1.1-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | dom4j | * | Up to (excluding) 2.1.3-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | dom4j | * | Up to (excluding) 2.1.3-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_8 | dom4j | * | Up to (excluding) 1.6.1+dfsg.3-2+deb8u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_9 | dom4j | * | Up to (including) 1.6.1+dfsg.3-2+deb9u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | dom4j | * | Up to (excluding) 2.1.3-1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | dom4j-manual | * | Up to (excluding) 1.6.1-lp151.6.3.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | dom4j | * | Up to (excluding) 1.6.1+dfsg.3-2ubuntu1.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | dom4j | * | Up to (excluding) 1.6.1+dfsg.3-2ubuntu1.1 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
CWE-ID | 漏洞类型 |
CWE-611 | XML外部实体引用的不恰当限制(XXE) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论