Skip to main content

Improper Restriction of XML External Entity Reference

CVE-2024-38374

Severity High
Score 7.5/10

Summary

The CycloneDX core module provides a model representation of the SBOM along with utilities to assist in creating, validating, and parsing SBOMs. Before deserializing CycloneDX Bill of Materials in XML format, "_cyclonedx-core-java_" leverages XPath expressions to determine the schema version of the BOM. The "DocumentBuilderFactory" used to evaluate XPath expressions was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. This issue affects versions 2.1.0 through 9.0.3.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • NONE

CWE-611 - Improper Restriction of XML External Entity Reference

Listed 4th in the 'OWASP Top Ten', XML External Entities (XXE) vulnerability allows attackers to provide an XML input that contains an external entity. When the XML is parsed, it can cause data extraction and manipulation, execution of commands, denial-of-service attacks, and server-side request forgery.

Advisory Timeline

  • Published