CVE-2021-43142:
Improper Restriction of XML External Entity Reference in wutka jox
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53463%
CWE
Published
4/1/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.wutka:jox | maven | <= 1.16 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies the readObject method in JOXSAXBeanInput as the source. Technical analysis from the blog shows this method directly uses SAXParser.parse() without configuring XML security features like FEATURE_SECURE_PROCESSING or disabling DTDs. The POC demonstrates XXE exploitation through this method. Java package naming conventions suggest the class would be in com/wutka/jox path. The direct match between advisory details and code analysis gives high confidence.