Vulnerability Details : CVE-2014-0931
Multiple XML external entity (XXE) vulnerabilities in the (1) CCRC WAN Server / CM Server, (2) Perl CC/CQ integration trigger scripts, (3) CMAPI Java interface, (4) ClearCase remote client, and (5) CMI and OSLC-based ClearQuest integrations components in IBM Rational ClearCase 7.1.0.x, 7.1.1.x, 7.1.2 through 7.1.2.13, 8.0 through 8.0.0.10, and 8.0.1 through 8.0.1.3 allow remote attackers to cause a denial of service or access other servers via crafted XML data. IBM X-Force ID: 92263.
Vulnerability category: XML external entity (XXE) injectionDenial of service
Products affected by CVE-2014-0931
- cpe:2.3:a:ibm:rational_clearcase:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_clearcase:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_clearcase:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_clearcase:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_clearcase:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0931
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-0931
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST | |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2014-0931
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0931
-
http://www-01.ibm.com/support/docview.wss?uid=swg21668868
IBM Security Bulletin: XML External Entity (XXE) vulnerabilities in ClearCase (CVE-2014-0931)Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/92263
XML External Entity (XXE) vulnerabilities in ClearCase CVE-2014-0931 Vulnerability ReportVDB Entry;Vendor Advisory
Jump to