org.apache.poi:poi@3.11-beta1 vulnerabilities

Apache POI - Java API To Access Microsoft Format Files

Direct Vulnerabilities

Known vulnerabilities in the org.apache.poi:poi package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

org.apache.poi:poi is a java library for reading and writing Microsoft Office binary and OOXML file formats.

Affected versions of this package are vulnerable to Denial of Service (DoS) in two possible scenarios:

  • Infinite Loops while parsing crafted WMF, EMF, MSG and macros.
  • Out of Memory Exceptions while parsing crafted DOC, PPT and XLS.

How to fix Denial of Service (DoS)?

Upgrade org.apache.poi:poi to version 3.17 or higher.

(,3.17)
  • M
XML External Entity (XXE) Injection

org.apache.poi:poi is a java library for reading and writing Microsoft Office binary and OOXML file formats.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection as it allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.poi:poi to version 3.15 or higher.

(,3.15)
  • M
Denial of Service (DoS)

org.apache.poi:poi is a java library for reading and writing Microsoft Office binary and OOXML file formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). The calculation of dataSize in Ole10Native's initialization is faulty, causing the code to allocate a large buffer and resulting in Out-Of-Memory.

How to fix Denial of Service (DoS)?

Upgrade org.apache.poi:poi to version 3.16-beta1 or higher.

[3.7,3.16-beta1)