Description
In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
Remediation
References
http://juddi.apache.org/security.html
https://issues.apache.org/jira/browse/JUDDI-987
Related Vulnerabilities
CVE-2023-24430 Vulnerability in maven package org.jenkins-ci.plugins:semantic-versioning-plugin
CVE-2023-48218 Vulnerability in npm package strapi-plugin-protected-populate
CVE-2018-1000176 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2023-49448 Vulnerability in maven package com.jfinal:jfinal
CVE-2015-1772 Vulnerability in maven package org.apache.hive:hive-service