UBUNTU-CVE-2021-23926

Source
https://ubuntu.com/security/CVE-2021-23926
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-23926.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2021-23926
Upstream
Published
2021-01-14T15:15:00Z
Modified
2025-07-16T08:26:10.627798Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.

References

Affected packages

Ubuntu:Pro:16.04:LTS / xmlbeans

Package

Name
xmlbeans
Purl
pkg:deb/ubuntu/xmlbeans@2.6.0-3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.6.0-2
2.6.0-3

Ubuntu:Pro:18.04:LTS / xmlbeans

Package

Name
xmlbeans
Purl
pkg:deb/ubuntu/xmlbeans@3.0.2-1~18.04?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.6.0+dfsg-2
2.6.0+dfsg-3

3.*

3.0.2-1~18.04

Ubuntu:20.04:LTS / xmlbeans

Package

Name
xmlbeans
Purl
pkg:deb/ubuntu/xmlbeans@3.0.2-1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.0.2-1",
            "binary_name": "libxmlbeans-java"
        },
        {
            "binary_version": "3.0.2-1",
            "binary_name": "xmlbeans"
        }
    ],
    "availability": "No subscription required"
}