Miggo Logo

CVE-2016-15011: dssp vulnerable to Improper Restriction of XML External Entity Reference

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.26569%
Published
1/6/2023
Updated
10/20/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
be.e_contract.dssp:dssp-clientmaven< 1.3.21.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure XML parsing in checkSignResponse. The pre-patch code:

  1. Used JAXB unmarshalling directly on raw input (new ByteArrayInputStream)
  2. Later created a DocumentBuilder without disabling DTDs
  3. The patch explicitly adds 'disallow-doctype-decl' feature to DocumentBuilderFactory and changes parsing order to use the secured DOM document for JAXB unmarshalling instead of raw input. The CVE description explicitly names checkSignResponse as the affected function, and the commit diff shows insecure XML handling patterns were present in this method prior to the fix.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility *l*ssi*i** *s pro*l*m*ti* w*s *oun* in *-*ontr**t *ssp up to *.*.*. *****t** *y t*is vuln*r**ility is t** *un*tion `****kSi*nR*spons*` o* t** *il* `*ssp-*li*nt/sr*/m*in/j*v*/**/*_*ontr**t/*ssp/*li*nt/Si*nR*spons*V*ri*i*r.j*v*`. T** m*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* XML p*rsin* in ****kSi*nR*spons*. T** pr*-p*t** *o**: *. Us** J*X* unm*rs**llin* *ir**tly on r*w input (n*w *yt**rr*yInputStr**m) *. L*t*r *r**t** * *o*um*nt*uil**r wit*out *is**lin* *T*s *. T** p*t** *xpli*itly