First published: Mon Dec 10 2018(Updated: )
Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apereo Bw-webdav | <4.0.3 | |
maven/org.bedework:bw-webdav | >=4.0.1<4.0.3 | 4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-20000.
The title of this vulnerability is 'Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks as demonstrated by an invite-reply document that reads a local file'.
This vulnerability allows XXE attacks, as demonstrated by an invite-reply document that reads a local file.
The affected software is Apereo Bw-webdav up to version 4.0.3.
The severity of this vulnerability is high with a CVSS score of 7.5.
The CWE ID associated with this vulnerability is CWE-611.
To fix this vulnerability, upgrade to version 4.0.3 of Apereo Bw-webdav.