libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
26 Feb 2025, 15:14
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netapp h410s
Netapp h410s Firmware Netapp h610s Fedoraproject fedora Netapp h300s Firmware Netapp h500s Netapp h410c Firmware Netapp h700s Firmware Libexpat Project libexpat Netapp h500s Firmware Libexpat Project Netapp h610c Netapp h610s Firmware Netapp Netapp h410c Netapp oncommand Workflow Automation Netapp ontap Tools Netapp h610c Firmware Netapp h700s Netapp h300s Netapp windows Host Utilities Fedoraproject Netapp ontap Netapp active Iq Unified Manager |
|
CWE | CWE-776 | |
CPE | cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:windows_host_utilities:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* |
|
References | () http://www.openwall.com/lists/oss-security/2024/03/15/1 - Mailing List, Patch, Release Notes | |
References | () https://github.com/libexpat/libexpat/issues/839 - Exploit, Issue Tracking, Patch | |
References | () https://github.com/libexpat/libexpat/pull/842 - Issue Tracking, Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/ - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20240322-0001/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
21 Nov 2024, 09:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/03/15/1 - | |
References | () https://github.com/libexpat/libexpat/issues/839 - | |
References | () https://github.com/libexpat/libexpat/pull/842 - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/ - | |
References | () https://security.netapp.com/advisory/ntap-20240322-0001/ - |
01 May 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Mar 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Mar 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-10 05:15
Updated : 2025-03-28 19:15
NVD link : CVE-2024-28757
Mitre link : CVE-2024-28757
CVE.ORG link : CVE-2024-28757
JSON object : View
Products Affected
netapp
- h610s
- active_iq_unified_manager
- h500s_firmware
- h410c_firmware
- h500s
- h700s
- ontap_tools
- oncommand_workflow_automation
- h410c
- h410s_firmware
- h700s_firmware
- h300s
- h610c_firmware
- h610s_firmware
- ontap
- h610c
- windows_host_utilities
- h300s_firmware
- h410s
fedoraproject
- fedora
libexpat_project
- libexpat
CWE
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')