低危 Oracle Utilities Framework up to 4.4.0.2 Common 拒绝服务漏洞

CVE编号

CVE-2018-1000632

利用情况

暂无

补丁情况

官方补丁

披露时间

2018-08-21
漏洞描述
版本2.1.1之前的dom4j版本在Class: Element中包含一个CWE-91: XML注入漏洞。方法:addElement、addAttribute,它们会导致攻击者通过XML注入篡改XML文档。这种攻击似乎可以通过攻击者在XML文档中指定属性或元素来利用。这个漏洞似乎在2.1.1或更高版本中已经修复。
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://access.redhat.com/errata/RHSA-2019:0362
https://access.redhat.com/errata/RHSA-2019:0364
https://access.redhat.com/errata/RHSA-2019:0365
https://access.redhat.com/errata/RHSA-2019:0380
https://access.redhat.com/errata/RHSA-2019:1159
https://access.redhat.com/errata/RHSA-2019:1160
https://access.redhat.com/errata/RHSA-2019:1161
https://access.redhat.com/errata/RHSA-2019:1162
https://access.redhat.com/errata/RHSA-2019:3172
https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387
https://github.com/dom4j/dom4j/issues/48
https://ihacktoprotect.com/post/dom4j-xml-injection/
https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e2...
https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8...
https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4...
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9...
https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161...
https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd...
https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44...
https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bc...
https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c...
https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.netapp.com/advisory/ntap-20190530-0001/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 dom4j_project dom4j * From
(including)
2.0.0
Up to
(excluding)
2.0.3
运行在以下环境
应用 dom4j_project dom4j * From
(including)
2.1.0
Up to
(excluding)
2.1.1
运行在以下环境
应用 netapp oncommand_workflow_automation - -
运行在以下环境
应用 netapp snapcenter - -
运行在以下环境
应用 netapp snapmanager - -
运行在以下环境
应用 netapp snap_creator_framework - -
运行在以下环境
应用 oracle flexcube_investor_servicing 12.0.4 -
运行在以下环境
应用 oracle flexcube_investor_servicing 12.1.0 -
运行在以下环境
应用 oracle flexcube_investor_servicing 12.3.0 -
运行在以下环境
应用 oracle flexcube_investor_servicing 12.4.0 -
运行在以下环境
应用 oracle flexcube_investor_servicing 14.0.0 -
运行在以下环境
应用 oracle primavera_p6_enterprise_project_portfolio_management * From
(including)
16.1.0.0
Up to
(including)
16.2.20.1
运行在以下环境
应用 oracle primavera_p6_enterprise_project_portfolio_management * From
(including)
17.1.0.0
Up to
(including)
17.12.17.1
运行在以下环境
应用 oracle primavera_p6_enterprise_project_portfolio_management * From
(including)
18.1.0.0
Up to
(including)
18.8.19.0
运行在以下环境
应用 oracle primavera_p6_enterprise_project_portfolio_management * From
(including)
19.12.0.0
Up to
(including)
19.12.6.0
运行在以下环境
应用 oracle rapid_planning 12.1 -
运行在以下环境
应用 oracle rapid_planning 12.2 -
运行在以下环境
应用 oracle retail_integration_bus 15.0 -
运行在以下环境
应用 oracle retail_integration_bus 16.0 -
运行在以下环境
应用 oracle utilities_framework * From
(including)
4.3.0.2.0
Up to
(including)
4.3.0.6.0
运行在以下环境
应用 oracle utilities_framework 2.2.0 -
运行在以下环境
应用 oracle utilities_framework 4.2.0.2.0 -
运行在以下环境
应用 oracle utilities_framework 4.2.0.3.0 -
运行在以下环境
应用 oracle utilities_framework 4.4.0.0.0 -
运行在以下环境
应用 oracle utilities_framework 4.4.0.2 -
运行在以下环境
应用 redhat jboss_enterprise_application_platform 6.0.0 -
运行在以下环境
应用 redhat jboss_enterprise_application_platform 6.4.0 -
运行在以下环境
应用 redhat jboss_enterprise_application_platform 7.1.0 -
运行在以下环境
应用 redhat satellite 6.6 -
运行在以下环境
应用 redhat satellite_capsule 6.6 -
运行在以下环境
系统 debian_10 dom4j * Up to
(excluding)
2.1.1-1
运行在以下环境
系统 debian_11 dom4j * Up to
(excluding)
2.1.1-1
运行在以下环境
系统 debian_12 dom4j * Up to
(excluding)
2.1.1-1
运行在以下环境
系统 fedora_33 dom4j * Up to
(excluding)
2.0.3-1.fc33
运行在以下环境
系统 fedora_34 dom4j * Up to
(excluding)
2.0.3-1.fc34
运行在以下环境
系统 opensuse_Leap_15.0 dom4j * Up to
(excluding)
1.6.1-lp150.3.3.1
运行在以下环境
系统 opensuse_Leap_42.3 dom4j * Up to
(excluding)
1.6.1-31.3.2
运行在以下环境
系统 ubuntu_16.04 dom4j * Up to
(excluding)
1.6.1+dfsg.3-2ubuntu1.2
运行在以下环境
系统 ubuntu_20.04 dom4j * Up to
(excluding)
2.1.1-1
运行在以下环境
系统 ubuntu_21.04 dom4j * Up to
(excluding)
2.1.1-1
运行在以下环境
系统 ubuntu_21.10 dom4j * Up to
(excluding)
2.1.1-1
运行在以下环境
系统 ubuntu_22.04 dom4j * Up to
(excluding)
2.1.1-1
运行在以下环境
系统 ubuntu_22.10 dom4j * Up to
(excluding)
2.1.1-1
阿里云评分
3.1
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-91 XML注入(XPath盲注)
阿里云安全产品覆盖情况