First published: Thu Apr 26 2018(Updated: )
Apache UIMA before version 2.10.2 has an XML external entity expansion vulnerability. A remote attacker could exploit this to potentially execute arbitrary code. External Reference: <a href="https://uima.apache.org/security_report#CVE-2017-15691">https://uima.apache.org/security_report#CVE-2017-15691</a>
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/uimaj | <2.10.2 | 2.10.2 |
Apache uimaj | <2.10.2 | |
Apache uimaj | =3.0.0 | |
Apache uimaj | =3.0.0-alpha | |
Apache uimaj | =3.0.0-alpha2 | |
Apache uima-as | <2.10.2 | |
Apache uimaFIT | <2.4.0 | |
Apache uimaDUCC | <2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15691 is a vulnerability in Apache uimaj, uima-as, uimaFIT, and uimaDUCC that allows XML external entity expansion (XXE).
CVE-2017-15691 has a severity rating of 8.8 (high).
CVE-2017-15691 affects Apache uimaj versions prior to 2.10.2 by allowing XML external entity expansion (XXE).
To fix CVE-2017-15691, update to Apache uimaj version 2.10.2 or later.
You can find more information about CVE-2017-15691 at the following references: [link1], [link2], [link3].