Moderate severityNVD Advisory· Published Jun 11, 2014· Updated May 6, 2026
CVE-2014-3004
CVE-2014-3004
Description
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.codehaus.castor:castorMaven | < 1.3.3 | 1.3.3 |
castor:castorMaven | <= 1.0 | — |
Affected products
5cpe:2.3:a:castor_project:castor:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:castor_project:castor:*:*:*:*:*:*:*:*range: <=1.3.2
- cpe:2.3:a:castor_project:castor:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:castor_project:castor:1.3.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.htmlnvdExploitWEB
- seclists.org/fulldisclosure/2014/May/142nvdExploitWEB
- lists.opensuse.org/opensuse-updates/2014-06/msg00043.htmlnvdThird Party AdvisoryWEB
- github.com/advisories/GHSA-jwwr-fjgh-cv2xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-3004ghsaADVISORY
- www.securityfocus.com/bid/67676nvdBroken Link
- quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811nvdWEB
- www.oracle.com/security-alerts/cpujan2020.htmlnvdWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlnvdWEB
- secunia.com/advisories/59427nvd
News mentions
0No linked articles in our index yet.