First published: Mon Dec 16 2013(Updated: )
IssueDescription: It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet2 OpenSAML | =2.0 | |
Internet2 OpenSAML | =2.1.0 | |
Internet2 OpenSAML | =2.2.0 | |
Shibboleth OpenSAML Java | <=2.6.0 | |
Shibboleth OpenSAML Java | =2.4.0 | |
Shibboleth OpenSAML Java | =2.4.1 | |
Shibboleth OpenSAML Java | =2.4.2 | |
Shibboleth OpenSAML Java | =2.4.3 | |
Shibboleth OpenSAML Java | =2.5.0 | |
Shibboleth OpenSAML Java | =2.5.1 | |
Shibboleth OpenSAML Java | =2.5.2 | |
Shibboleth OpenSAML Java | =2.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6440 is considered a high severity vulnerability due to its potential to allow remote attackers to read arbitrary files from the affected system.
To fix CVE-2013-6440, upgrade to OpenSAML version 2.5.0 or later, which addresses the XML External Entity (XXE) vulnerability.
CVE-2013-6440 can be exploited through XML External Entity (XXE) attacks allowing attackers to access sensitive files on the server.
CVE-2013-6440 affects OpenSAML versions including 2.0, 2.1.0, 2.2.0, and any versions up to 2.6.0.
No, CVE-2013-6440 affects the core classes of the OpenSAML implementation regardless of configuration.