Description
The CycloneDX core module provides a model representation of the SBOM along with utilities to assist in creating, validating, and parsing SBOMs. Starting in version 2.1.0 and prior to version 11.0.1, the XML `Validator` used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 was incomplete in that it only fixed parsing of XML BOMs, but not validation. The vulnerability has been fixed in cyclonedx-core-java version 11.0.1. As a workaround, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format.
Problem types
CWE-611: Improper Restriction of XML External Entity Reference
Product status
References
github.com/...e-java/security/advisories/GHSA-6fhj-vr9j-g45r
github.com/CycloneDX/cyclonedx-core-java/pull/737
github.com/...ommit/162aa594f347b3f612fe0a45071693c3cd398ce9
github.com/...ommit/af0ec75c93c03f93733a070c5132554490af5314
cheatsheetseries.owasp.org/...ty_Prevention_Cheat_Sheet.html