First published: Mon Oct 05 2020(Updated: )
It was discovered that Yaws did not properly sanitize XML input. A remote attacker could use this vulnerability to execute an XML External Entity (XXE) injection attack. (CVE-2020-24379) It was discovered that Yaws mishandled certain input when running CGI scripts. A remote attacker could use this vulnerability to execute arbitrary commands. (CVE-2020-24916)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/erlang-yapp | <2.0.4+dfsg-2ubuntu0.1 | 2.0.4+dfsg-2ubuntu0.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/erlang-yaws | <2.0.4+dfsg-2ubuntu0.1 | 2.0.4+dfsg-2ubuntu0.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/yaws | <2.0.4+dfsg-2ubuntu0.1 | 2.0.4+dfsg-2ubuntu0.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/yaws-mail | <2.0.4+dfsg-2ubuntu0.1 | 2.0.4+dfsg-2ubuntu0.1 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4569-1 is high due to the potential for XML External Entity (XXE) injection exploits.
To fix USN-4569-1, update the affected packages to version 2.0.4+dfsg-2ubuntu0.1 on Ubuntu 18.04.
USN-4569-1 affects the erlang-yapp, erlang-yaws, yaws, and yaws-mail packages in Ubuntu 18.04.
Yes, USN-4569-1 can potentially lead to data breaches if exploited through an XML External Entity injection.
USN-4569-1 impacts system security by allowing remote attackers to execute unauthorised commands via improper handling of XML input.