{"id":"UBUNTU-CVE-2018-1000548","details":"Umlet version \u003c 14.3 contains a XML External Entity (XXE) vulnerability in File parsing that can result in disclosure of confidential data, denial of service, server side request forgery. This attack appear to be exploitable via Specially crafted UXF file. This vulnerability appears to have been fixed in 14.3.","modified":"2026-01-20T16:50:32.105950Z","published":"2018-06-26T16:29:00Z","upstream":["CVE-2018-1000548"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000548"},{"type":"REPORT","url":"http://0dd.zone/2018/04/23/UMLet-XXE/"},{"type":"REPORT","url":"https://github.com/umlet/umlet/issues/500"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000548"}],"affected":[{"package":{"name":"umlet","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/umlet@13.3-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["13.3-1"],"ecosystem_specific":{"binaries":[{"binary_name":"umlet","binary_version":"13.3-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"}},{"package":{"name":"umlet","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/umlet@13.3-1.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["13.3-1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"umlet","binary_version":"13.3-1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"}},{"package":{"name":"umlet","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/umlet@13.3-1.3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["13.3-1.2","13.3-1.3"],"ecosystem_specific":{"binaries":[{"binary_name":"umlet","binary_version":"13.3-1.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"}},{"package":{"name":"umlet","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/umlet@13.3-1.3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["13.3-1.3"],"ecosystem_specific":{"binaries":[{"binary_name":"umlet","binary_version":"13.3-1.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"}},{"package":{"name":"umlet","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/umlet@15.1+ds-1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"15.1+ds-1"}]}],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"umlet","binary_version":"15.1+ds-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1000548.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}