{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T10:02:56.546","vulnerabilities":[{"cve":{"id":"CVE-2017-3206","sourceIdentifier":"cret@cert.org","published":"2018-06-11T17:29:00.727","lastModified":"2024-11-21T03:25:01.933","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Java implementation of AMF3 deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery."},{"lang":"es","value":"La implementación de Java de los deserializadores AMF3 empleada en Flamingo amf-serializer, de Exadel, versión 2.2.0, permite referencias a entidades externas (XXE) de documentos XML embebidos en mensajes AMF3. Si el análisis de XML se gestiona de manera incorrecta, podría exponer datos sensibles en el servidor o provocar una denegación de servicio (DoS) o Server-Side Request Forgery (SSRF)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:exadel:flamingo:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"14271505-24A5-4A02-9D89-5849F8917E68"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/97380","source":"cret@cert.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution","source":"cret@cert.org","tags":["Third Party Advisory"]},{"url":"https://codewhitesec.blogspot.com/2017/04/amf.html","source":"cret@cert.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/307983","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/97380","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://codewhitesec.blogspot.com/2017/04/amf.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/307983","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}