CVE-2016-2175
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/06/2016
Last modified:
12/04/2025
Description
Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:pdfbox:1.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:1.8.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:2.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pdfbox:2.0:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8%40apache.org%3E
- http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html
- http://rhn.redhat.com/errata/RHSA-2017-0179.html
- http://rhn.redhat.com/errata/RHSA-2017-0248.html
- http://rhn.redhat.com/errata/RHSA-2017-0249.html
- http://rhn.redhat.com/errata/RHSA-2017-0272.html
- http://svn.apache.org/viewvc?view=revision&revision=1739564
- http://svn.apache.org/viewvc?view=revision&revision=1739565
- http://www.debian.org/security/2016/dsa-3606
- http://www.securityfocus.com/archive/1/538503/100/0/threaded
- http://www.securityfocus.com/bid/90902
- https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54%40%3Ccommits.tika.apache.org%3E
- http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8%40apache.org%3E
- http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html
- http://rhn.redhat.com/errata/RHSA-2017-0179.html
- http://rhn.redhat.com/errata/RHSA-2017-0248.html
- http://rhn.redhat.com/errata/RHSA-2017-0249.html
- http://rhn.redhat.com/errata/RHSA-2017-0272.html
- http://svn.apache.org/viewvc?view=revision&revision=1739564
- http://svn.apache.org/viewvc?view=revision&revision=1739565
- http://www.debian.org/security/2016/dsa-3606
- http://www.securityfocus.com/archive/1/538503/100/0/threaded
- http://www.securityfocus.com/bid/90902
- https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54%40%3Ccommits.tika.apache.org%3E



