CVE-2014-3004

critical

Description

The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.

References

https://www.oracle.com/security-alerts/cpuoct2021.html

https://www.oracle.com/security-alerts/cpujan2020.html

https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811

http://secunia.com/advisories/59427

http://lists.opensuse.org/opensuse-updates/2014-06/msg00043.html

Details

Source: Mitre, NVD

Published: 2014-06-11

Updated: 2025-04-12

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.00778