XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html | Third Party Advisory |
http://seclists.org/fulldisclosure/2014/Jun/87 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/68075 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1110496 | Issue Tracking Third Party Advisory |
https://support.zabbix.com/browse/ZBX-8151 | Exploit Patch Vendor Advisory |
https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2018-02-01 17:29
Updated : 2018-02-21 14:57
NVD link : CVE-2014-3005
Mitre link : CVE-2014-3005
CVE.ORG link : CVE-2014-3005
JSON object : View
Products Affected
fedoraproject
- fedora
zabbix
- zabbix
CWE
CWE-611
Improper Restriction of XML External Entity Reference