// For flags

CVE-2014-3004

Castor Library - XML External Entity Information Disclosure

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.

La configuración por defecto para Xerces SAX Parser en Castor anterior a 1.3.3 permite a atacantes dependientes de contexto realizar ataques de entidad externa XML (XXE) a través de un documento XML manipulado.

Castor Library version 1.3.3-RC1 suffers from a file disclosure vulnerability via XXE injection.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-04-25 CVE Reserved
  • 2014-05-27 First Exploit
  • 2014-05-30 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Castor Project
Search vendor "Castor Project"
Castor
Search vendor "Castor Project" for product "Castor"
<= 1.3.2
Search vendor "Castor Project" for product "Castor" and version " <= 1.3.2"
-
Affected
Castor Project
Search vendor "Castor Project"
Castor
Search vendor "Castor Project" for product "Castor"
1.3
Search vendor "Castor Project" for product "Castor" and version "1.3"
-
Affected
Castor Project
Search vendor "Castor Project"
Castor
Search vendor "Castor Project" for product "Castor"
1.3.1
Search vendor "Castor Project" for product "Castor" and version "1.3.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.1
Search vendor "Opensuse" for product "Opensuse" and version "13.1"
-
Affected
Opensuse Project
Search vendor "Opensuse Project"
Opensuse
Search vendor "Opensuse Project" for product "Opensuse"
12.3
Search vendor "Opensuse Project" for product "Opensuse" and version "12.3"
-
Affected