5.3.0
16 years ago
6 months ago
Known vulnerabilities in the org.apache.poi:poi-ooxml package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. When using the tool How to fix XML External Entity (XXE) Injection? Upgrade | [,4.1.0) |
org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection as it allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack. How to fix XML External Entity (XXE) Injection? Upgrade | [,3.15) |
org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XXE) attack. How to fix XML External Entity (XXE) Injection? Upgrade | [,3.11-beta2) |
org.apache.poi:poi-ooxml is a Java API To Access Microsoft Format Files. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. The OPC SAX setup in Apache POI allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. How to fix XML External Entity (XXE) Injection? Upgrade | [,3.10.1)[3.11-beta1,3.11-beta2) |