CVE-2019-13990
Severity CVSS v4.0:
Pending analysis
Type:
CWE-611
Improper Restriction of XML External Entity Reference ('XXE')
Publication date:
26/07/2019
Last modified:
15/10/2024
Description
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:softwareag:quartz:*:*:*:*:*:*:*:* | 2.3.2 (excluding) | |
cpe:2.3:a:oracle:apache_batik_mapviewer:12.2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:apache_batik_mapviewer:18c:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:apache_batik_mapviewer:19c:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:banking_enterprise_originations:2.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:banking_enterprise_originations:2.8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:banking_payments:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.4.0 (including) |
cpe:2.3:a:oracle:communications_ip_service_activator:7.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:* | 8.2.0 (including) | 8.2.2 (including) |
cpe:2.3:a:oracle:customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:documaker:*:*:*:*:*:*:*:* | 12.6.0 (including) | 12.6.4 (including) |
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://confluence.atlassian.com/security/ssot-117-cve-2019-13990-xxe-xml-external-entity-injection-vulnerability-in-jira-service-management-data-center-and-jira-service-management-server-1295385959.html
- https://github.com/quartz-scheduler/quartz/issues/467
- https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82%40%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3%40%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949%40%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629%40%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf%40%3Ccommits.tomee.apache.org%3E
- https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a%40%3Ccommits.tomee.apache.org%3E
- https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf%40%3Ccommits.tomee.apache.org%3E
- https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa%40%3Ccommits.tomee.apache.org%3E
- https://security.netapp.com/advisory/ntap-20221028-0002/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html