First published: Tue May 12 2015(Updated: )
The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XML-LibXML | <=2.0118 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Ubuntu Linux | =15.04 | |
Debian | =7.0 | |
Debian | =8.0 | |
Fedora | =20 | |
Fedora | =21 | |
Open edX | =13.1 | |
Open edX | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3451 can lead to XML external entity (XXE) attacks.
CVE-2015-3451 affects XML::LibXML versions before 2.0119.
CVE-2015-3451 can allow remote attackers to exploit vulnerabilities via crafted XML data.
The _clone function in XML::LibXML is key in the vulnerability of CVE-2015-3451.
To mitigate CVE-2015-3451, update XML::LibXML to version 2.0119 or later.