Description
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Remediation
References
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
http://secunia.com/advisories/60419
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
http://poi.apache.org/changes.html
http://rhn.redhat.com/errata/RHSA-2014-1398.html
http://rhn.redhat.com/errata/RHSA-2014-1399.html
http://rhn.redhat.com/errata/RHSA-2014-1400.html
http://rhn.redhat.com/errata/RHSA-2014-1370.html
http://secunia.com/advisories/59943
http://secunia.com/advisories/61766
http://www.securityfocus.com/bid/69648
http://www-01.ibm.com/support/docview.wss?uid=swg21996759
https://exchange.xforce.ibmcloud.com/vulnerabilities/95768
Related Vulnerabilities
CVE-2022-43428 Vulnerability in maven package com.compuware.jenkins:compuware-topaz-for-total-test
CVE-2023-31064 Vulnerability in maven package org.apache.inlong:manager-workflow
CVE-2021-22112 Vulnerability in maven package org.springframework.security:spring-security-core
CVE-2013-0158 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-21341 Vulnerability in maven package com.thoughtworks.xstream:xstream