| ID |
CVE-2024-8010
|
| Sažetak |
The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references.
By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product. |
| Reference |
|
| CVSS |
| Base: | 3.5 |
| Impact: | 1.4 |
| Exploitability: | 2.1 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| ADJACENT_NETWORK |
LOW |
LOW |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
NONE |
NONE |
|
| CVSS vektor |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
| Zadnje važnije ažuriranje |
17-04-2026 - 15:38 |
| Objavljeno |
16-04-2026 - 10:16 |