Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-12400

Опубликовано: 23 авг. 2019
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7xmlsecNot affected
Red Hat JBoss BRMS 5xmlsecOut of support scope
Red Hat JBoss Data Virtualization 6xmlsecOut of support scope
Red Hat JBoss Enterprise Application Platform 5xmlsecOut of support scope
Red Hat JBoss Enterprise Application Platform 6xmlsecOut of support scope
Red Hat JBoss Fuse 6camel-xmlsecurityOut of support scope
Red Hat JBoss Fuse 6xmlsecOut of support scope
Red Hat JBoss Fuse Service Works 6camel-xmlsecurityOut of support scope
Red Hat JBoss Operations Network 3xmlsecOut of support scope
Red Hat JBoss SOA Platform 5xmlsecOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1764658xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source

EPSS

Процентиль: 69%
0.00587
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

CVSS3: 5.5
nvd
больше 6 лет назад

In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

CVSS3: 5.5
debian
больше 6 лет назад

In version 2.0.3 Apache Santuario XML Security for Java, a caching mec ...

CVSS3: 5.5
github
больше 6 лет назад

Improper input validation in Apache Santuario XML Security for Java

CVSS3: 5.5
fstec
больше 6 лет назад

Уязвимость DOM-анализатора DocumentBuilders платформы для обеспечения стандартов безопасности для XML Apache Santuario XML Security for Java, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 69%
0.00587
Низкий

5.9 Medium

CVSS3