{"vuid":"VU#779243","idnumber":"779243","name":"EpubCheck 4.0.1 contains a XML external entity processing vulnerability","keywords":["XXE","CWE-611","epub"],"overview":"EpubCheck 4.0.1 is vulnerable to external XML entity processing attacks.","clean_desc":"EpubCheck is a tool to validate that EPUB files follow the proper format. It can be used as a stand alone command line utility, or included in a project (most commonly being epub readers) as a library. CWE-611: Improper Restriction of XML External Entity Reference ('XXE')  - CVE-2016-9487 \nEpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim's trust relationship with other entities.","impact":"A remote attacker may be able to access arbitrary files on a system, or cause the system execute arbitrary requests.","resolution":"Apply an update\nEpubCheck has released version 4.0.2 to address the vulnerability.","workarounds":"","sysaffected":"","thanks":"Thanks to Craig Arendt for reporting this vulnerability.","author":"This document was written by Trent Novelly.","public":["https://github.com/IDPF/epubcheck","http://idpf.org/epub","https://helpx.adobe.com/security/products/Digital-Editions/apsb16-45.html","https://support.apple.com/HT207432"],"cveids":["CVE-2016-9487"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-10-10T20:32:23Z","publicdate":"2016-12-13T00:00:00Z","datefirstpublished":"2016-12-13T14:41:39Z","dateupdated":"2016-12-14T18:20:45Z","revision":15,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.9","cvss_environmentalscore":"4.45157417001938","cvss_environmentalvector":"CDP:N/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}