First published: Fri Jul 13 2018(Updated: )
EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim's trust relationship with other entities.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
W3 Epubcheck | =4.0.1 |
EpubCheck has released version 4.0.2 to address the vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9487 is considered a medium severity vulnerability due to its potential for reading arbitrary files and executing unintended requests.
To fix CVE-2016-9487, upgrade to a version of EpubCheck that addresses this vulnerability, as version 4.0.1 is affected.
CVE-2016-9487 enables an attacker to exploit the parsing of XML in EPUB files to read arbitrary files on the victim's system.
The affected version of the software related to CVE-2016-9487 is EpubCheck 4.0.1.
It is the responsibility of users and administrators of EpubCheck to ensure they apply necessary updates to mitigate CVE-2016-9487.