Vulnerability Details : CVE-2017-5661
In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
Vulnerability category: XML external entity (XXE) injectionDenial of service
Products affected by CVE-2017-5661
- cpe:2.3:a:apache:formatting_objects_processor:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-5661
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-5661
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.9
|
HIGH | AV:N/AC:M/Au:S/C:C/I:N/A:C |
6.8
|
9.2
|
NIST | |
7.3
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H |
2.1
|
5.2
|
NIST |
CWE ids for CVE-2017-5661
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-5661
-
https://www.tenable.com/security/tns-2021-14
[R1] Tenable.sc 5.19.0 Fixes Multiple Third-party Vulnerabilities - Security Advisory | TenableĀ®
-
http://www.securityfocus.com/bid/97947
Apache FOP CVE-2017-5661 XML External Entity Information Disclosure Vulnerability
-
http://www.debian.org/security/2017/dsa-3864
Debian -- Security Information -- DSA-3864-1 fop
-
https://xmlgraphics.apache.org/security.html
The Apache™ XML Graphics Project - CommunityPatch;Vendor Advisory
Jump to