Description
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
Remediation
References
http://lists.opensuse.org/opensuse-updates/2014-06/msg00043.html
http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html
http://seclists.org/fulldisclosure/2014/May/142
http://secunia.com/advisories/59427
http://www.securityfocus.com/bid/67676
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
Related Vulnerabilities
CVE-2021-44832 Vulnerability in maven package org.apache.logging.log4j:log4j-core
CVE-2014-0073 Vulnerability in npm package cordova-plugin-inappbrowser
CVE-2018-3735 Vulnerability in npm package bracket-template
CVE-2019-15599 Vulnerability in maven package org.webjars.npm:tree-kill
CVE-2022-36897 Vulnerability in maven package com.compuware.jenkins:compuware-xpediter-code-coverage