CVE-2024-34345

The CycloneDX JavaScript library contains the core functionality of OWASP CycloneDX for JavaScript. In 6.7.0, XML External entity injections were possible, when running the provided XML Validator on arbitrary input. This issue was fixed in version 6.7.1.
Configurations

No configuration.

History

21 Nov 2024, 09:18

Type Values Removed Values Added
References () https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 - () https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 -
References () https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 - () https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 -
References () https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7 - () https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7 -
Summary
  • (es) La librería JavaScript CycloneDX contiene la funcionalidad principal de OWASP CycloneDX para JavaScript. En 6.7.0, las inyecciones de entidades externas XML eran posibles al ejecutar el validador XML proporcionado en entradas arbitrarias. Este problema se solucionó en la versión 6.7.1.

14 May 2024, 15:38

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 15:38

Updated : 2024-11-21 09:18


NVD link : CVE-2024-34345

Mitre link : CVE-2024-34345

CVE.ORG link : CVE-2024-34345


JSON object : View

Products Affected

No product.

CWE
CWE-611

Improper Restriction of XML External Entity Reference