CVE-2014-125087: java-xmlbuilder vulnerable to XML External Entity Reference
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22915%
CWE
Published
2/19/2023
Updated
3/1/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.jamesmurty.utils:java-xmlbuilder | maven | < 1.2 | 1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from XML parser configurations that allowed external entity processing by default. The commit e6fddca explicitly adds enableExternalEntities parameters to create/parse methods and disables them by default. The pre-patch versions of these methods in XMLBuilder and XMLBuilder2 classes lacked this protection:
- createDocumentImpl and parseDocumentImpl in BaseXMLBuilder.java were called without entity protection before the patch
- Public-facing create()/parse() methods in XMLBuilder/XMLBuilder2 propagated this insecure configuration
- The test case added in BaseXMLBuilderTests.java demonstrates XXE vulnerability in pre-patch behavior
- CWE-611 directly maps to insecure XML parsing configurations that allow external entity references