Bug 27727 - [Update Request] apache-poi
Summary: [Update Request] apache-poi
Status: RESOLVED DUPLICATE of bug 25599
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact: Sec team
URL: https://nvd.nist.gov/vuln/detail/CVE-...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-12-04 01:31 CET by Zombie Ryushu
Modified: 2020-12-04 01:36 CET (History)
0 users

See Also:
Source RPM: apache-poi
CVE: CVE-2019-12415
Status comment:


Attachments

Description Zombie Ryushu 2020-12-04 01:31:37 CET
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
Zombie Ryushu 2020-12-04 01:32:16 CET

CVE: (none) => CVE-2019-12415

Comment 1 David Walser 2020-12-04 01:36:27 CET
Already reported.  Please search bugzilla first!

*** This bug has been marked as a duplicate of bug 25599 ***

Resolution: (none) => DUPLICATE
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.