xerces:xercesImpl@2.12.0 vulnerabilities

  • latest version

    2.12.2

  • latest non vulnerable version

  • first published

    19 years ago

  • latest version published

    3 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the xerces:xercesImpl package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family.

    Affected versions of this package are vulnerable to Denial of Service (DoS) via the XML parser when handling specially crafted XML document payloads. When the parser tries to parse such a document it gets stuck in an infinite loop for a long time, which consumes resources.

    How to fix Denial of Service (DoS)?

    Upgrade xerces:xercesImpl to version 2.12.2 or higher.

    [0,2.12.2)
    • M
    Improper Input Validation

    xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family.

    Affected versions of this package are vulnerable to Improper Input Validation due to the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code.

    How to fix Improper Input Validation?

    Upgrade xerces:xercesImpl to version 2.12.0.SP03 or higher.

    [,2.12.0.SP03)