Description
Eclipse Leshan is a device management server and client Java implementation. In affected versions DDFFileParser` and `DefaultDDFFileValidator` (and so `ObjectLoader`) are vulnerable to `XXE Attacks`. A DDF file is a LWM2M format used to store LWM2M object description. Leshan users are impacted only if they parse untrusted DDF files (e.g. if they let external users provide their own model), in that case they MUST upgrade to fixed version. If you parse only trusted DDF file and validate only with trusted xml schema, upgrading is not mandatory. This issue has been fixed in versions 1.5.0 and 2.0.0-M13. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Remediation
References
https://github.com/eclipse-leshan/leshan/commit/4d3e63ac271a817f81fba3e3229c519af7a3049c
https://github.com/eclipse-leshan/leshan/wiki/Adding-new-objects#the-lwm2m-model
https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7
https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
https://github.com/eclipse-leshan/leshan/commit/29577d2879ba8e7674c3b216a7f01193fc7ae013
Related Vulnerabilities
CVE-2014-0193 Vulnerability in maven package org.onosproject:onos-netconf-provider-device
CVE-2022-24728 Vulnerability in maven package org.webjars.bowergithub.ckeditor:ckeditor4
CVE-2019-14820 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2022-2900 Vulnerability in npm package parse-url
CVE-2010-1330 Vulnerability in maven package org.jruby.jcodings:jcodings