CVE-2022-46751: Apache Ivy External Entity Reference vulnerability
8.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.25978%
CWE
Published
8/21/2023
Updated
2/13/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.ivy:ivy | maven | < 2.5.2 | 2.5.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing configurations. The commit patching CVE-2022-46751 introduces secure processing flags (ivy.xml.allow-doctype-processing, ivy.xml.external-resources) and modifies XMLHelper to enforce them. The vulnerable functions are those that previously created XML parsers without these restrictions. Key areas include SAXParser/DocumentBuilderFactory configurations in XMLHelper, and specific XML parsing entry points (settings files, Ivy descriptors, POM files) that used the insecure parsers. The high confidence comes from explicit security-related code changes in these functions within the provided diff.