{"id":"UBUNTU-CVE-2016-5000","details":"The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.","modified":"2025-10-24T04:45:47Z","published":"2016-08-05T14:59:00Z","upstream":["CVE-2016-5000"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5000"},{"type":"REPORT","url":"https://marc.info/?l=oss-security&m=146921513313216&w=2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-5000"}],"affected":[{"package":{"name":"libapache-poi-java","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libapache-poi-java@3.10.1-2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.10.1-2"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache-poi-java","binary_version":"3.10.1-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-5000.json"}},{"package":{"name":"libapache-poi-java","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/libapache-poi-java@4.0.1-1~18.03?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.10.1-3","4.0.1-1~18.03"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache-poi-java","binary_version":"4.0.1-1~18.03"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-5000.json"}},{"package":{"name":"libapache-poi-java","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/libapache-poi-java@4.0.1-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.0.1-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache-poi-java","binary_version":"4.0.1-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-5000.json"}},{"package":{"name":"libapache-poi-java","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/libapache-poi-java@4.0.1-3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.0.1-1","4.0.1-2","4.0.1-3"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache-poi-java","binary_version":"4.0.1-3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-5000.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"negligible"}]}