CVE Vulnerabilities

CVE-2014-3004

Improper Restriction of XML External Entity Reference

Published: Jun 11, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
5 MODERATE
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.

Weakness

The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

Affected Software

NameVendorStart VersionEnd Version
CastorCastor_project*1.3.2 (including)
CastorCastor_project1.3 (including)1.3 (including)
CastorCastor_project1.3.1 (including)1.3.1 (including)
CastorUbuntuartful*
CastorUbuntubionic*
CastorUbuntucosmic*
CastorUbuntudevel*
CastorUbuntudisco*
CastorUbuntueoan*
CastorUbuntuesm-apps/bionic*
CastorUbuntuesm-apps/focal*
CastorUbuntuesm-apps/jammy*
CastorUbuntuesm-apps/noble*
CastorUbuntuesm-apps/xenial*
CastorUbuntufocal*
CastorUbuntugroovy*
CastorUbuntuhirsute*
CastorUbuntuimpish*
CastorUbuntujammy*
CastorUbuntukinetic*
CastorUbuntulunar*
CastorUbuntumantic*
CastorUbuntunoble*
CastorUbuntuoracular*
CastorUbuntuplucky*
CastorUbuntuprecise*
CastorUbuntuquesting*
CastorUbuntusaucy*
CastorUbuntutrusty*
CastorUbuntuupstream*
CastorUbuntuutopic*
CastorUbuntuvivid*
CastorUbuntuwily*
CastorUbuntuxenial*
CastorUbuntuyakkety*
CastorUbuntuzesty*

Potential Mitigations

References