Processing Foundation Processing version 3.4 and earlier contains a XML External Entity (XXE) vulnerability in loadXML() function that can result in An attacker can read arbitrary files and exfiltrate their contents via HTTP requests. This attack appear to be exploitable via The victim must use Processing to parse a crafted XML document.
References
Link Resource
https://github.com/processing/processing/issues/5706 Exploit Third Party Advisory Patch
https://twitter.com/ben_fry/status/1054333613465059329 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:21:59

Updated: 2022-10-03T16:21:59

Reserved: 2018-10-22T00:00:00


Link: CVE-2018-1000840

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-12-20T15:29:01.877

Modified: 2019-02-07T14:59:15.900


Link: CVE-2018-1000840

JSON object: View

cve-icon Redhat Information

No data.

CWE