CVE-2020-11991

HIGH EXPLOITED NUCLEI

Apache Cocoon 2.1.12 - XML Injection

Title source: nuclei

Description

When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.

Nuclei Templates (1)

Apache Cocoon 2.1.12 - XML Injection
HIGHby pikpikcu
Shodan: http.html:"Apache Cocoon" || http.html:"apache cocoon"
FOFA: body="apache cocoon"

Scores

CVSS v3 7.5
EPSS 0.9314
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-11-25
CWE
CWE-611
Status published
Products (1)
apache/cocoon 2.1 - 2.1.12
Published Sep 11, 2020
Tracked Since Feb 18, 2026