Executive Summary

Summary
Title EpubCheck 4.0.1 contains a XML external entity processing vulnerability
Informations
Name VU#779243 First vendor Publication 2016-12-13
Vendor VU-CERT Last vendor Modification 2016-12-14
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#779243

EpubCheck 4.0.1 contains a XML external entity processing vulnerability

Original Release date: 13 Dec 2016 | Last revised: 14 Dec 2016

Overview

EpubCheck 4.0.1 is vulnerable to external XML entity processing attacks.

Description

EpubCheck is a tool to validate that EPUB files follow the proper format. It can be used as a stand alone command line utility, or included in a project (most commonly being epub readers) as a library.

CWE-611: Improper Restriction of XML External Entity Reference ('XXE') - CVE-2016-9487
EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim's trust relationship with other entities.

Impact

A remote attacker may be able to access arbitrary files on a system, or cause the system execute arbitrary requests.

Solution

Apply an update

EpubCheck has released version 4.0.2 to address the vulnerability.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AdobeAffected-13 Dec 2016
AppleAffected-14 Dec 2016
International Digital Publishing ForumAffected13 Oct 201609 Dec 2016
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.8AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal5.9E:--/RL:OF/RC:C
Environmental4.5CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

  • https://github.com/IDPF/epubcheck
  • http://idpf.org/epub
  • https://helpx.adobe.com/security/products/Digital-Editions/apsb16-45.html
  • https://support.apple.com/HT207432

Credit

Thanks to Craig Arendt for reporting this vulnerability.

This document was written by Trent Novelly.

Other Information

  • CVE IDs:CVE-2016-9487
  • Date Public:13 Dec 2016
  • Date First Published:13 Dec 2016
  • Date Last Updated:14 Dec 2016
  • Document Revision:13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/779243

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-611 Information Leak Through XML External Entity File Disclosure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2018-09-08 00:21:46
  • Multiple Updates
2018-07-14 00:21:04
  • Multiple Updates
2016-12-14 21:23:17
  • Multiple Updates
2016-12-13 21:24:03
  • Multiple Updates
2016-12-13 17:22:00
  • First insertion