First published: Fri Oct 27 2017(Updated: )
XML external entity (XXE) vulnerability in the Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted DTD.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.xmlrpc:xmlrpc | <=3.1.3 | |
PHP XML-RPC | =3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5002 has been classified with a high severity rating due to its potential for server-side request forgery (SSRF) attacks.
To fix CVE-2016-5002, upgrade to a version of Apache XML-RPC later than 3.1.3 that does not contain the vulnerability.
The impact of CVE-2016-5002 includes unauthorized access to internal resources and potential data leakage via malicious XML inputs.
CVE-2016-5002 specifically affects Apache XML-RPC version 3.1.3.
No, CVE-2016-5002 is not an executable vulnerability, but rather an XML external entity (XXE) vulnerability that can be exploited through crafted XML requests.