Miggo Logo

CVE-2018-1000632:
Dom4j contains a XML Injection vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.77811%
Published
10/16/2018
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.dom4j:dom4jmaven< 2.0.32.0.3
org.dom4j:dom4jmaven= 2.1.02.1.1
dom4j:dom4jmaven<= 1.6.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The functions identified are directly related to the validation and creation of QNames, which were vulnerable to XML injection attacks. The patches introduced validation checks to prevent such attacks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*om*j v*rsion prior to v*rsion *.*.* *ont*ins * *W*-**: XML Inj**tion vuln*r**ility in *l*ss: *l*m*nt. M*t*o*s: ****l*m*nt, ****ttri*ut* t**t **n r*sult in *n *tt**k*r t*mp*rin* wit* XML *o*um*nts t*rou** XML inj**tion. T*is *tt**k *pp**r to ** *xplo

Reasoning

T** *un*tions i**nti*i** *r* *ir**tly r*l*t** to t** v*li**tion *n* *r**tion o* QN*m*s, w*i** w*r* vuln*r**l* to XML inj**tion *tt**ks. T** p*t***s intro*u*** v*li**tion ****ks to pr*v*nt su** *tt**ks.