CVE-2019-15160

The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
References
Link Resource
https://github.com/kbrw/sweet_xml/issues/71 Exploit Third Party Advisory
https://hex.pm/packages/sweet_xml Third Party Advisory
https://github.com/kbrw/sweet_xml/issues/71 Exploit Third Party Advisory
https://hex.pm/packages/sweet_xml Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:kbrw:sweet_xml:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-08-19 06:15

Updated : 2024-11-21 04:28


NVD link : CVE-2019-15160

Mitre link : CVE-2019-15160

CVE.ORG link : CVE-2019-15160


JSON object : View

Products Affected

kbrw

  • sweet_xml
CWE
CWE-776

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')