{"id":11663,"date":"2020-10-14T01:31:05","date_gmt":"2020-10-14T01:31:05","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=11663"},"modified":"2026-04-17T18:07:47","modified_gmt":"2026-04-17T18:07:47","slug":"websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/","title":{"rendered":"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Vulnerability Description<\/h2>\n\n\n\n<p>Recently, IBM released a security bulletin to announce the fix of an XML external entity injection (XXE) vulnerability (CVE-2020-4643) on WebSphere Application Server (WAS). Since WAS fails to properly process XML data, a remote attacker could exploit this vulnerability to obtain sensitive information on the server.<\/p>\n\n\n\n<p>The NSFOCUS security research team reported CVE-2020-4643 to IBM. CVE-2020-4643 can be used in combination with CVE-2020-4450 to trigger an XXE vulnerability that requires no authentication to exploit, thereby causing the disclosure of sensitive server information. The vulnerability is comparatively easy to exploit and involves high risks. Affected users should take preventive measures as soon as possible.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>WAS is reliable, flexible, and robust enterprise-class web middleware. It has been widely applied to enterprises&#8217; web services.<\/p>\n\n\n\n<p>Screenshot of reproducing server information read without authentication:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"678\" height=\"690\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-1-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11665\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-1-1.jpg 678w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-1-1-295x300.jpg 295w\" sizes=\"(max-width: 678px) 100vw, 678px\" \/><\/figure><\/div>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.ibm.com\/support\/pages\/security-bulletin-websphere-application-server-vulnerable-information-exposure-vulnerability-cve-2020-4643\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>WebSphere Application Server 9.0.0.0 &#8211; 9.0.5.5<\/li><li>WebSphere Application Server 8.5.0.0 &#8211; 8.5.5.17<\/li><li>WebSphere Application Server 8.0.0.0 &#8211; 8.0.0.15<\/li><li>WebSphere Application Server 7.0.0.0 &#8211; 7.0.0.45<\/li><\/ul>\n\n\n\n<p>Note: Official support is no longer available for WebSphere Application Server V7.0 and V8.0.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Check for the Vulnerability<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Version Check<\/strong><\/li><\/ul>\n\n\n\n<p>Related users can check whether their applications are vulnerable by checking the current version.<\/p>\n\n\n\n<p>Method 1: Log in to WebSphere Administrator to view version information.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"600\" height=\"261\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11666\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-2.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-2-300x131.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<p>If it is one of the affected versions, the application is vulnerable.<\/p>\n\n\n\n<p>Method 2: Go to the \/opt\/IBM\/WebSphere\/AppServer\/bin directory and run the command .\/versionInfo.sh to check the current version and the Package date. If the Package date is earlier than 20200902, the application is vulnerable.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><code>.\/versionInfo.sh<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"503\" height=\"483\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-3-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11668\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-3-1.jpg 503w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-3-1-300x288.jpg 300w\" sizes=\"(max-width: 503px) 100vw, 503px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Detection with NSFOCUS Product<\/li><\/ul>\n\n\n\n<p>NSFOCUS Unified Threat Sensor (UTS) is capable of detecting the vulnerability. Please upgrade it to the latest version.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product<\/strong><\/td><td><strong>Version<\/strong><\/td><td><strong>Download Link<\/strong><\/td><\/tr><tr><td><strong>UTS<\/strong><strong><\/strong><\/td><td>5.6.10.23620<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108759<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Official Fix<\/strong><\/li><\/ul>\n\n\n\n<p>Currently, IBM has released patches to fix the vulnerability and provided security patches to the versions for which official support is no longer available. Affected users are advised to install the patches as soon as possible.<\/p>\n\n\n\n<p>Affected users can upgrade with IBM Installation Manager by updating the versions and applying the patches as prompted.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"414\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-4-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11670\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-4-1.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1014-4-1-300x207.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<p>Users can also download and install the patches from the official website of IBM.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><strong>Affected Version<\/strong><\/td><td><strong>Fixes<\/strong><\/td><td><strong>Patch Download Link<\/strong><\/td><\/tr><tr><td>9.0.0.0 &#8211; 9.0.5.5<\/td><td>Security Patch PH27509<\/td><td>https:\/\/www.ibm.com\/support\/pages\/node\/6333617<\/td><\/tr><tr><td>8.5.0.0 &#8211; 8.5.5.17<\/td><td>Security Patch PH27509<\/td><\/tr><tr><td>8.0.0.0 &#8211; 8.0.0.15<\/td><td>Upgrade to version 8.0.0.15 and apply the Patch PH27509<\/td><\/tr><tr><td>7.0.0.0 &#8211; 7.0.0.45<\/td><td>Upgrade to version 7.0.0.45 and apply the Patch PH27509<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Note: Please disable the WebSphere service before installing the patches and start the service after patch installation.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Protection with NSFOCUS Product<\/strong><\/li><\/ul>\n\n\n\n<p>NSFOCUS Network Intrusion Protection System (NIPS) has released related rules to defend against this vulnerability. Users are advised to update the rule base to the latest versions to ensure that the security product can effectively protect against this vulnerability. The following table lists the rule base versions of security products.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product<\/strong><\/td><td><strong>Rule Base Version<\/strong><\/td><td><a><strong>Download Link<\/strong><\/a><strong><\/strong><\/td><\/tr><tr><td><strong>IPS<\/strong><strong><\/strong><\/td><td>5.6.9.23620<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108741<\/td><\/tr><tr><td>5.6.10.23620<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108742<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For how to update product rules, click the following link:<\/p>\n\n\n\n<p>IPS: https:\/\/mp.weixin.qq.com\/s\/JsRktENQNj1TdZSU62N0Ww<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description Recently, IBM released a security bulletin to announce the fix of an XML external entity injection (XXE) vulnerability (CVE-2020-4643) on WebSphere Application Server (WAS). Since WAS fails to properly process XML data, a remote attacker could exploit this vulnerability to obtain sensitive information on the server. The NSFOCUS security research team reported CVE-2020-4643 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11441,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[746],"class_list":["post-11663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-websphere"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description Recently, IBM released a security bulletin to announce the fix of an XML external entity injection (XXE) vulnerability\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-14T01:31:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description Recently, IBM released a security bulletin to announce the fix of an XML external entity injection (XXE) vulnerability\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide\",\"datePublished\":\"2020-10-14T01:31:05+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/\"},\"wordCount\":757,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/0912-5.jpg\",\"keywords\":[\"WebSphere\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/\",\"name\":\"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/0912-5.jpg\",\"datePublished\":\"2020-10-14T01:31:05+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/0912-5.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/0912-5.jpg\",\"width\":600,\"height\":336,\"caption\":\"Digital padlock on blue circuit board.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS","og_description":"Vulnerability Description Recently, IBM released a security bulletin to announce the fix of an XML external entity injection (XXE) vulnerability","og_url":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/","og_site_name":"NSFOCUS","article_published_time":"2020-10-14T01:31:05+00:00","article_modified_time":"2026-04-17T18:07:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS","twitter_description":"Vulnerability Description Recently, IBM released a security bulletin to announce the fix of an XML external entity injection (XXE) vulnerability","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide","datePublished":"2020-10-14T01:31:05+00:00","dateModified":"2026-04-17T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/"},"wordCount":757,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg","keywords":["WebSphere"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/","url":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/","name":"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg","datePublished":"2020-10-14T01:31:05+00:00","dateModified":"2026-04-17T18:07:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/0912-5.jpg","width":600,"height":336,"caption":"Digital padlock on blue circuit board."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/websphere-xml-external-entity-injection-vulnerability-cve-2020-4643-handling-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"WebSphere XML External Entity Injection Vulnerability (CVE-2020-4643) Handling Guide"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=11663"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11663\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/11441"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=11663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=11663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=11663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}