<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0012</id>
    <title>An update for dom4j is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:00"/>
    <updated date="2023-01-05 02:56:00"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000632" id="CVE-2018-1000632" title="CVE-2018-1000632 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. (CVE-2018-1000632)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="dom4j">
        <name>HCE 1.1</name>
        <package arch="noarch" name="dom4j" version="1.6.1" release="21.hce1c">
          <filename>dom4j-1.6.1-21.hce1c.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
