Show plain JSON{"containers": {"cna": {"affected": [{"product": "Apache Jena", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "4.4.0", "status": "affected", "version": "Apache Jena", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Apache Jena would like to thank Feras Daragma, Avishag Shapira & Amit Laish (GE Digital, Cyber Security Lab) for their report."}], "descriptions": [{"lang": "en", "value": "A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and 4.3.x do not allow external entities."}], "metrics": [{"other": {"content": {"other": "medium"}, "type": "unknown"}}], "problemTypes": [{"descriptions": [{"description": "XML External DTD vulnerability", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-05-05T08:40:09", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878"}], "source": {"discovery": "UNKNOWN"}, "title": "Processing external DTDs", "workarounds": [{"lang": "en", "value": "Users are advised to upgrade to Apache Jena 4.5.0 or later."}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@apache.org", "ID": "CVE-2022-28890", "STATE": "PUBLIC", "TITLE": "Processing external DTDs"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Apache Jena", "version": {"version_data": [{"version_affected": "<=", "version_name": "Apache Jena", "version_value": "4.4.0"}]}}]}, "vendor_name": "Apache Software Foundation"}]}}, "credit": [{"lang": "eng", "value": "Apache Jena would like to thank Feras Daragma, Avishag Shapira & Amit Laish (GE Digital, Cyber Security Lab) for their report."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and 4.3.x do not allow external entities."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": [{"other": "medium"}], "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "XML External DTD vulnerability"}]}]}, "references": {"reference_data": [{"name": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878", "refsource": "MISC", "url": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878"}]}, "source": {"discovery": "UNKNOWN"}, "work_around": [{"lang": "en", "value": "Users are advised to upgrade to Apache Jena 4.5.0 or later."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T06:10:56.881Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://lists.apache.org/thread/h88oh642455wljo0p5jgzs9phk4gj878"}]}]}, "cveMetadata": {"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-28890", "datePublished": "2022-05-05T08:40:09", "dateReserved": "2022-04-09T00:00:00", "dateUpdated": "2024-08-03T06:10:56.881Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}