Miggo Logo

CVE-2016-3674:
XML External Entity Injection in XStream

7.5

CVSS Score

Basic Information

EPSS Score
-
Published
6/30/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.thoughtworks.xstream:xstreammaven< 1.4.91.4.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from XML parser configurations in various XStream drivers that did not disable external entity processing. Each listed function is responsible for creating XML parser factories/builders for their respective XML processing implementations (DOM, DOM4J, JDOM, StAX). The functions are vulnerable because they didn't implement security settings like disabling DTD processing or external entity expansion, which are standard XXE mitigations. The high confidence comes from: 1) The CVE explicitly listing these drivers 2) XStream's changelog showing 1.4.9 addressed XXE in these components 3) Security best practices for XML parsing requiring these protections.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Multipl* XML *xt*rn*l *ntity (XX*) vuln*r**iliti*s in t** (*) *om*J*riv*r, (*) *om*riv*r, (*) J*om*riv*r, (*) J*om**riv*r, (*) Sjsxp*riv*r, (*) St*n**r*St*x*riv*r, *n* (*) Wstx*riv*r *riv*rs in XStr**m ***or* *.*.* *llow r*mot* *tt**k*rs to r*** *r*i

Reasoning

T** vuln*r**ility st*ms *rom XML p*rs*r *on*i*ur*tions in v*rious XStr**m *riv*rs t**t *i* not *is**l* *xt*rn*l *ntity pro**ssin*. **** list** *un*tion is r*sponsi*l* *or *r**tin* XML p*rs*r ***tori*s/*uil**rs *or t**ir r*sp**tiv* XML pro**ssin* impl