Miggo Logo

CVE-2022-46751: Apache Ivy External Entity Reference vulnerability

8.2

CVSS Score
3.1

Basic Information

EPSS Score
0.25978%
Published
8/21/2023
Updated
2/13/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.ivy:ivymaven< 2.5.22.5.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure XML parsing configurations. The commit patching CVE-2022-46751 introduces secure processing flags (ivy.xml.allow-doctype-processing, ivy.xml.external-resources) and modifies XMLHelper to enforce them. The vulnerable functions are those that previously created XML parsers without these restrictions. Key areas include SAXParser/DocumentBuilderFactory configurations in XMLHelper, and specific XML parsing entry points (settings files, Ivy descriptors, POM files) that used the insecure parsers. The high confidence comes from explicit security-related code changes in these functions within the provided diff.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Improp*r R*stri*tion o* XML *xt*rn*l *ntity R***r*n**, XML Inj**tion (*k* *lin* XP*t* Inj**tion) vuln*r**ility in *p**** So*tw*r* *oun**tion *p**** Ivy.T*is issu* *****ts *ny v*rsion o* *p**** Ivy prior to *.*.*. W**n *p**** Ivy prior to *.*.* p*rs*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* XML p*rsin* *on*i*ur*tions. T** *ommit p*t**in* `*V*-****-*****` intro*u**s s**ur* pro**ssin* *l**s (`ivy.xml.*llow-*o*typ*-pro**ssin*`, `ivy.xml.*xt*rn*l-r*sour**s`) *n* mo*i*i*s `XML**lp*r` to *n*or** t**m. T**