Vulnerability Details : CVE-2024-28757
libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
Products affected by CVE-2024-28757
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
- cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
- cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:windows_host_utilities:-:*:*:*:*:*:*:*
- cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-28757
0.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-28757
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-03-28 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | 2025-03-28 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-28757 | 2024-03-10 |
CWE ids for CVE-2024-28757
-
The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2024-28757
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/
[SECURITY] Fedora 40 Update: mingw-expat-2.6.1-1.fc40 - package-announce - Fedora Mailing-ListsMailing List
-
https://github.com/libexpat/libexpat/issues/839
ClusterFuzz finding 66812 · Issue #839 · libexpat/libexpat · GitHubExploit;Issue Tracking;Patch
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/
[SECURITY] Fedora 38 Update: mingw-expat-2.6.1-1.fc38 - package-announce - Fedora Mailing-ListsMailing List
-
http://www.openwall.com/lists/oss-security/2024/03/15/1
oss-security - Expat 2.6.2 released, includes security fixesMailing List;Patch;Release Notes
-
https://security.netapp.com/advisory/ntap-20240322-0001/
CVE-2024-28757 libexpat Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://github.com/libexpat/libexpat/pull/842
[CVE-REQUESTED] Prevent billion laughs attacks in isolated external parser (part of #839) by hartwork · Pull Request #842 · libexpat/libexpat · GitHubIssue Tracking;Patch
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/
[SECURITY] Fedora 39 Update: mingw-expat-2.6.1-1.fc39 - package-announce - Fedora Mailing-ListsMailing List
Jump to