Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-12400

Опубликовано: 23 авг. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1.9
CVSS3: 5.5

Описание

In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

2.1.7-2
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

not-affected

2.1.7-2
esm-apps/noble

not-affected

2.1.7-2
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

Показывать по

EPSS

Процентиль: 69%
0.00587
Низкий

1.9 Low

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 6 лет назад

In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

CVSS3: 5.5
nvd
больше 6 лет назад

In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.

CVSS3: 5.5
debian
больше 6 лет назад

In version 2.0.3 Apache Santuario XML Security for Java, a caching mec ...

CVSS3: 5.5
github
больше 6 лет назад

Improper input validation in Apache Santuario XML Security for Java

CVSS3: 5.5
fstec
больше 6 лет назад

Уязвимость DOM-анализатора DocumentBuilders платформы для обеспечения стандартов безопасности для XML Apache Santuario XML Security for Java, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 69%
0.00587
Низкий

1.9 Low

CVSS2

5.5 Medium

CVSS3