First published: Tue Jun 08 2021(Updated: )
An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jdom Jdom | <=2.0.6 | |
Apache Solr | =8.8.1 | |
Apache Solr | =8.9 | |
Apache Tika | =1.25 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =35 | |
Oracle Communications Messaging Server | =8.1 | |
IBM Sterling Secure Proxy | <=6.0.3 | |
IBM Sterling Secure Proxy | <=6.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this issue is CVE-2021-33813.
CVE-2021-33813 has a severity level of high.
This vulnerability can be exploited by sending a specially-crafted HTTP request.
You can fix CVE-2021-33813 in IBM Sterling Secure Proxy 6.0.3 by applying the patch available at [IBM Fix Central](https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Other+software&product=ibm/Other+software/Sterling+Secure+Proxy&release=6.0.3.0&platform=All&function=all).
You can fix CVE-2021-33813 in IBM Sterling Secure Proxy 6.1.0 by applying the patch available at [IBM Fix Central](https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Other+software&product=ibm/Other+software/Sterling+Secure+Proxy&release=6.1.0.0&platform=All&function=all).