{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T19:14:26.837","vulnerabilities":[{"cve":{"id":"CVE-2018-1307","sourceIdentifier":"security@apache.org","published":"2018-02-09T19:29:00.227","lastModified":"2024-11-21T03:59:35.573","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5."},{"lang":"es","value":"En Apache jUDDI 3.2 hasta 3.3.4, si se usan las clases WADL2Java o WSDL2Java, que analizan un documento XML local o remoto y luego convierten las estructuras de datos en estructuras de datos UDDI, hay pocas protecciones contra ataques de expansión de entidad y DTD. La solución es emplear la versión 3.3.5."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:juddi:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndIncluding":"3.3.4","matchCriteriaId":"B35A9FEC-8DEA-4BA1-B62A-9C66A4C01408"}]}]}],"references":[{"url":"http://juddi.apache.org/security.html","source":"security@apache.org","tags":["Vendor Advisory"]},{"url":"https://issues.apache.org/jira/browse/JUDDI-987","source":"security@apache.org","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"http://juddi.apache.org/security.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://issues.apache.org/jira/browse/JUDDI-987","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]}]}}]}