<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0068</id>
    <title>An update for dom4j is now available for HCE 2.0</title>
    <severity>Critical</severity>
    <release>HCE 2.0</release>
    <issued date="2024-03-26 06:00:41"/>
    <updated date="2024-03-26 06:00:41"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-10683" id="CVE-2020-10683" title="CVE-2020-10683 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. (CVE-2020-10683)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="dom4j">
        <name>HCE 2.0</name>
        <package arch="noarch" name="dom4j" version="2.0.0" release="8.hce2">
          <filename>dom4j-2.0.0-8.hce2.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
