Saturday, January 18, 2025
HomeCyber Security NewsApache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data

Apache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data and access sensitive information that is restricted to only the machine that runs Apache Ivy.

This vulnerability exists in the parsing of XML files in versions lesser than 2.5.2 while parsing its own configuration, Maven POMs (Project Object Models), which allows external document downloading and expansion of any entity references.

Threat actors can exploit this Blind XPath injection vulnerability to manipulate or execute the Ivy in different ways or access sensitive information inside the machine. This vulnerability is due to improper restriction of XML External Entity reference.

It is a dependency manager which resolves project dependencies and is a part of the Apache Ant project. It uses an XML file for defining project dependencies to list the necessary resources to build a project.

The CVE ID for this vulnerability has been given as CVE-2022-46751, and the CVSS score is yet to be confirmed.

Apache Ivy 2.5.2 version released

Prior to Apache Ivy version 2.5.2, Apache Ivy has DTD processing by default while parsing Maven POMs and other files.

However, as part of fixing the bug, Apache has released Apache Ivy version 2.5.2, which disables DTD (Document Type Definition) processing for all the files excluding Maven POMs, which allows only a DTD snippet to be included that is used for dealing with existing Maven POMs.

These are not valid XML files but are accepted by Maven POMs. Apache Ivy is a part of the Apache Ant project that specializes in automating software build processes which originated from the Apache Tomcat Project 2000.

Users are recommended to upgrade to the latest version of Apache Ivy 2.5.2 to prevent this vulnerability from getting exploited. As an alternative, Java system properties can be used to restrict the processing of external DTDs.

Keep informed about the latest Cyber Security News by following us on GoogleNewsLinkedinTwitter, and Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....