Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
SolidCAM-GPPL-IDE: XML External Entity (XXE) and billion-laughs DoS in VMID parser
Vulnerability Description
SolidCAM-GPPL-IDE is an unofficial, independently developed extension, Postprocessor IDE for SolidCAM. From version 1.0.0 to before version 1.0.2, Opening a .gpp file in the SolidCAM Postprocessor IDE extension causes the language server to parse a companion .vmid file from the same directory (naming convention: foo.gpp to foo.vmid). The VMID parser called XDocument.Load(path) without any XmlReaderSettings, inheriting the framework defaults which in .NET 8 allow DTD processing. A malicious .vmid file could therefore: disclose local files via external entity references, exhaust memory via recursive entity expansion, and cause denial of service via oversized or deeply nested XML. This issue has been patched in version 1.0.2.
CVSS Information
N/A
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
Postprocessor IDE for SolidCAM 资源管理错误漏洞
Vulnerability Description
Postprocessor IDE for SolidCAM是Andrey Zorin个人开发者的一个GPPL语言开发支持工具。 Postprocessor IDE for SolidCAM 1.0.0版本至1.0.2之前版本存在资源管理错误漏洞,该漏洞源于打开.gpp文件时语言服务器解析同一目录中的.vmid文件,VMID解析器调用XDocument.Load(path)时无XmlReaderSettings,继承允许DTD处理的框架默认值,可能导致恶意.vmid文件通过外部实体引用泄露本地文件、通过递
CVSS Information
N/A
Vulnerability Type
N/A