With the release of 2.10, fop-core at 2.9 is now flagged with CVE-2024-28168, 
which is considered a SEVERE / HIGH violation by Sonatype Lifecycle 
vulnerability scans.

Description from CVE
Improper Restriction of XML External Entity Reference ('XXE') vulnerability in 
Apache XML Graphics FOP. This issue affects Apache XML Graphics FOP: 2.9. Users 
are recommended to upgrade to version 2.10, which fixes the issue.

Explanation
Apache XML Graphics FOP is vulnerable to XML eXternal Entity (XXE) attacks due 
to the Improper Restriction of XML External Entity Reference. The transformTo() 
method in the InputHandler class processes malicious external entities by 
default due to an unsafe XML parser configuration. A remote attacker who can 
supply an XML file to be parsed by this package can exploit this vulnerability 
to exfiltrate sensitive information, execute Server-Side Request Forgery 
(SSRF), or perform other XXE-related attacks.

Detection
The application is vulnerable by using this component.

Recommendation
We recommend upgrading to a version of this component that is not vulnerable to 
this specific issue.
Note: If this component is included as a bundled/transitive dependency of 
another component, there may not be an upgrade path. In this instance, we 
recommend contacting the maintainers who included the vulnerable package. 
Alternatively, we recommend investigating alternative components or a potential 
mitigating control.

Version Affected
[2.4,2.9]

Root Cause
fop-core-2.9.jarorg/apache/fop/cli/InputHandler.class( , 2.10)

Advisories
Project
https://github.com/advisories/GHSA-jqfv-jrvq-95jm

CVSS Details
CVE CVSS 3
7.5
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N



-Josh

Reply via email to