Improper Restriction of XML External Entity Reference in org.jetbrains.kotlin:kotlin-compiler
Cxdfe95b9f-ea87
- org.jetbrains.kotlin:kotlin-compiler
- org.jetbrains.kotlin:kotlin-compiler-1.0.0-beta
- org.jetbrains.kotlin:kotlin-compiler-client-embeddable
- org.jetbrains.kotlin:kotlin-compiler-client-embeddable-1.3.0-rc
- org.jetbrains.kotlin:kotlin-compiler-embeddable
- org.jetbrains.kotlin:kotlin-compiler-embeddable-1.0.0-beta
- org.jetbrains.kotlin:kotlin-compiler-embeddable-1.0.0-rc
- org.jetbrains.kotlin:kotlin-compiler-embeddable-1.3.0-rc
- org.jetbrains.kotlin:kotlin-compiler-internal-test-framework
- org.jetbrains.kotlin:kotlin-compiler-1.0.0-rc
- org.jetbrains.kotlin:kotlin-compiler-1.3.0-rc
- org.jetbrains.kotlin:kotlin-jps-plugin
Summary
Kotlin is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. This issue was fixed in version 1.7.0.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- HIGH
- LOW
CWE-611 - Improper Restriction of XML External Entity Reference
Listed 4th in the 'OWASP Top Ten', XML External Entities (XXE) vulnerability allows attackers to provide an XML input that contains an external entity. When the XML is parsed, it can cause data extraction and manipulation, execution of commands, denial-of-service attacks, and server-side request forgery.
References
Advisory Timeline
- Published