{"id":"CVE-2016-7051","details":"XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.","aliases":["GHSA-7c2r-3jqf-c9rw"],"modified":"2026-04-10T03:53:02.284133Z","published":"2017-04-14T18:59:00.813Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/97688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378673"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-dataformat-xml/issues/211"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fasterxml/jackson-dataformat-xml","events":[{"introduced":"0"},{"fixed":"f34ec6c783930397b69dbbdb48f77fd771f18ef4"},{"introduced":"0"},{"last_affected":"0f2e4b3fc24fe2f16538c15f1dbfb2858f19cb78"},{"introduced":"0"},{"last_affected":"9382b8113f1f1d5f85309f2859ae5f0ced0ae240"},{"introduced":"0"},{"last_affected":"6b017bf29037948e396b76284fdb9a248752a847"},{"introduced":"0"},{"last_affected":"4330471f9bd084092d1f5124839a17c74a4c14fd"},{"introduced":"0"},{"last_affected":"38394f0c65811f9edf9c0fff593f621408e3cd64"},{"introduced":"0"},{"last_affected":"1cb421f9733c1afb80cd3e4653142784fccc3263"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.7.8"},{"introduced":"0"},{"last_affected":"2.8.0-NA"},{"introduced":"0"},{"last_affected":"2.8.0-rc1"},{"introduced":"0"},{"last_affected":"2.8.0-rc2"},{"introduced":"0"},{"last_affected":"2.8.1"},{"introduced":"0"},{"last_affected":"2.8.2"},{"introduced":"0"},{"last_affected":"2.8.3"}]}}],"versions":["jackson-dataformat-xml-2.0.0","jackson-dataformat-xml-2.0.1","jackson-dataformat-xml-2.0.2","jackson-dataformat-xml-2.0.3","jackson-dataformat-xml-2.0.4","jackson-dataformat-xml-2.1.0","jackson-dataformat-xml-2.1.1","jackson-dataformat-xml-2.1.2","jackson-dataformat-xml-2.2.0","jackson-dataformat-xml-2.2.1","jackson-dataformat-xml-2.2.2","jackson-dataformat-xml-2.3.0","jackson-dataformat-xml-2.3.1","jackson-dataformat-xml-2.4.0","jackson-dataformat-xml-2.4.1","jackson-dataformat-xml-2.4.2","jackson-dataformat-xml-2.4.3","jackson-dataformat-xml-2.5.0","jackson-dataformat-xml-2.6.0","jackson-dataformat-xml-2.6.1","jackson-dataformat-xml-2.6.2","jackson-dataformat-xml-2.7.0","jackson-dataformat-xml-2.7.1","jackson-dataformat-xml-2.7.2","jackson-dataformat-xml-2.7.3","jackson-dataformat-xml-2.7.4","jackson-dataformat-xml-2.7.5","jackson-dataformat-xml-2.7.6","jackson-dataformat-xml-2.7.7","jackson-dataformat-xml-2.8.0","jackson-dataformat-xml-2.8.0.rc1","jackson-dataformat-xml-2.8.0.rc2","jackson-dataformat-xml-2.8.1","jackson-dataformat-xml-2.8.2","jackson-dataformat-xml-2.8.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7051.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"}]}