Description
In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
Remediation
References
http://juddi.apache.org/security.html
https://issues.apache.org/jira/browse/JUDDI-987
Related Vulnerabilities
CVE-2018-1999027 Vulnerability in maven package org.jenkins-ci.plugins:saltstack
CVE-2017-5929 Vulnerability in maven package ch.qos.logback:logback-classic
CVE-2021-31404 Vulnerability in maven package com.vaadin:flow-server
CVE-2010-3718 Vulnerability in maven package tomcat:catalina
CVE-2020-12480 Vulnerability in maven package com.typesafe.play:play_2.11