Processing Foundation Processing version 3.4 and earlier contains a XML External Entity (XXE) vulnerability in loadXML() function that can result in An attacker can read arbitrary files and exfiltrate their contents via HTTP requests. This attack appear to be exploitable via The victim must use Processing to parse a crafted XML document.
References
Link | Resource |
---|---|
https://github.com/processing/processing/issues/5706 | Exploit Third Party Advisory Patch |
https://twitter.com/ben_fry/status/1054333613465059329 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:59
Updated: 2022-10-03T16:21:59
Reserved: 2018-10-22T00:00:00
Link: CVE-2018-1000840
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-12-20T15:29:01.877
Modified: 2019-02-07T14:59:15.900
Link: CVE-2018-1000840
JSON object: View
Redhat Information
No data.
CWE