Description
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
Remediation
References
http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E
https://seclists.org/bugtraq/2019/Dec/11
Related Vulnerabilities
CVE-2021-26291 Vulnerability in maven package org.apache.maven:apache-maven
CVE-2020-10683 Vulnerability in maven package org.dom4j:dom4j
CVE-2021-43838 Vulnerability in npm package jsx-slack
CVE-2018-16475 Vulnerability in npm package knightjs
CVE-2021-21625 Vulnerability in maven package org.jenkins-ci.plugins:aws-credentials