Vulnerability Details : CVE-2020-11991
When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.
Vulnerability category: XML external entity (XXE) injection
Products affected by CVE-2020-11991
- cpe:2.3:a:apache:cocoon:*:*:*:*:*:*:*:*
Threat overview for CVE-2020-11991
Top countries where our scanners detected CVE-2020-11991
Top open port discovered on systems with this issue
80
IPs affected by CVE-2020-11991 90
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-11991!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2020-11991
88.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-11991
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2020-11991
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-11991
-
https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E
[CVE-2020-11991] Apache Cocoon security vulnerability - Pony MailExploit;Mailing List;Vendor Advisory
Jump to