vulnerability
Apache OFBiz: CVE-2011-3600: XML External Entity (XXE) Injection
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Nov 26, 2019 | Dec 23, 2024 | Nov 28, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Nov 26, 2019
Added
Dec 23, 2024
Modified
Nov 28, 2025
Description
The /webtools/control/xmlrpc endpoint in ofbiz xml-rpc event handler is exposed to external entity injection by passing doctype declarations with executable payloads that discloses the contents of files in the filesystem. in addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. this affects ofbiz 16.11.01 to 16.11.04.
Solution
apache-ofbiz-upgrade-latest
References
- CWE-611
- CVE-2011-3600
- https://attackerkb.com/topics/CVE-2011-3600
- URL-http://mail-archives.apache.org/mod_mbox/ofbiz-user/201810.mbox/%3Cfad45546-af86-0293-9ea7-014553474b30%40apache.org%3E
- URL-https://access.redhat.com/security/cve/cve-2011-3600
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3600
- URL-https://lists.apache.org/thread.html/7793319ae80ec350f7b82a8763460944f120ebe447f14a12155d0550%40%3Ccommits.ofbiz.apache.org%3E
- URL-https://security-tracker.debian.org/tracker/CVE-2011-3600
- URL-https://svn.apache.org/viewvc?view=revision&revision=1833724
- URL-https://svn.apache.org/viewvc?view=revision&revision=1833708
- URL-https://svn.apache.org/viewvc?view=revision&revision=1836141
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.