Apache

Olingo

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.18%
  • Veröffentlicht 09.01.2020 19:15:10
  • Zuletzt bearbeitet 21.11.2024 05:11:37

Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to...

  • EPSS 2.2%
  • Veröffentlicht 04.12.2019 18:15:16
  • Zuletzt bearbeitet 21.11.2024 04:32:31

The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to imple...

Exploit
  • EPSS 52.53%
  • Veröffentlicht 04.12.2019 17:16:43
  • Zuletzt bearbeitet 21.11.2024 04:32:30

The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used t...

  • EPSS 0.78%
  • Veröffentlicht 04.12.2019 17:16:43
  • Zuletzt bearbeitet 21.11.2024 04:32:31

Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running ...