CVE-2020-11991
HIGH EXPLOITED NUCLEIApache Cocoon 2.1.12 - XML Injection
Title source: nucleiDescription
When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.
Nuclei Templates (1)
Apache Cocoon 2.1.12 - XML Injection
HIGHby pikpikcu
Shodan:
http.html:"Apache Cocoon" || http.html:"apache cocoon"
FOFA:
body="apache cocoon"
Scores
CVSS v3
7.5
EPSS
0.9314
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-11-25
CWE
CWE-611
Status
published
Products (1)
apache/cocoon
2.1 - 2.1.12
Published
Sep 11, 2020
Tracked Since
Feb 18, 2026