First published: Thu Mar 26 2020(Updated: )
Mulesoft APIkit through 1.3.0 allows XXE because of validation/RestXmlSchemaValidator.java
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.mule.modules:mule-apikit-module | <=1.3.0 | 1.3.1 |
MuleSoft Anypoint Platform (Mule Runtime) | <=1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10991 is classified as a high severity vulnerability due to the potential for XML External Entity (XXE) attacks.
To mitigate CVE-2020-10991, upgrade to version 1.3.1 or later of the MuleSoft APIkit.
CVE-2020-10991 allows for XML External Entity attacks which can lead to exposure of sensitive data or system compromise.
CVE-2020-10991 affects MuleSoft APIkit versions up to and including 1.3.0.
Yes, CVE-2020-10991 is a concern for all users of affected versions of the MuleSoft APIkit that process XML.