CVE-2020-1925
- EPSS 1.18%
- Published 09.01.2020 19:15:10
- Last modified 21.11.2024 05:11:37
Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to...
CVE-2019-17555
- EPSS 2.2%
- Published 04.12.2019 18:15:16
- Last modified 21.11.2024 04:32:31
The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to imple...
CVE-2019-17554
- EPSS 52.53%
- Published 04.12.2019 17:16:43
- Last modified 21.11.2024 04:32:30
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used t...
- EPSS 0.78%
- Published 04.12.2019 17:16:43
- Last modified 21.11.2024 04:32:31
Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running ...