Vulnerability Name:
CVE-2019-3774 (CCN-155922)
Assigned:
2019-01-14
Published:
2019-01-14
Updated:
2020-06-29
Summary:
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVSS v3 Severity:
9.8 Critical
(CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
)
8.5 High
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
5.5 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
)
4.8 Medium
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
None
Availibility (A):
None
CVSS v2 Severity:
7.5 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
4.6 Medium
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:S/C:C/I:N/A:N
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
None
Availibility (A):
None
Vulnerability Type:
CWE-611
Vulnerability Consequences:
Obtain Information
References:
Source: MITRE
Type: CNA
CVE-2019-3774
Source: XF
Type: UNKNOWN
pivotal-cve20193774-info-disc(155922)
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200206 [jira] [Updated] (SM-4315) Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200618 [jira] [Reopened] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200629 [jira] [Updated] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200205 [jira] [Resolved] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200203 [jira] [Updated] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-commits] 20200618 [servicemix-bundles] branch master updated: [SM-4315]add spring-batch-infrastructure-3.0.10.RELEASE(address CVE-2019-3774)
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200618 [jira] [Commented] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200629 [jira] [Resolved] (SM-4315) Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200618 [jira] [Commented] (SM-4315) Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-commits] 20200618 [servicemix-bundles] branch master updated: [SM-4312]add spring-batch-infrastructure-4.0.2.RELEASE(address CVE-2019-3774)
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200206 [jira] [Assigned] (SM-4315) Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200206 [jira] [Resolved] (SM-4315) Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-commits] 20200206 [servicemix-bundles] branch master updated: [SM-4315]Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200618 [jira] [Reopened] (SM-4315) Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200203 [jira] [Created] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200206 [jira] [Created] (SM-4315) Upgrade spring-batch from 3.0.8 to 3.0.10 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200203 [jira] [Assigned] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-issues] 20200629 [jira] [Resolved] (SM-4312) Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: MLIST
Type: UNKNOWN
[servicemix-commits] 20200203 [servicemix-bundles] branch master updated: [SM-4312]Upgrade spring-batch from 4.0.1 to 4.0.2 to address CVE-2019-3774
Source: CCN
Type: Pivotal Web site
CVE-2019-3774: XML External Entity Injection (XXE)
Source: CONFIRM
Type: Mitigation, Vendor Advisory
https://pivotal.io/security/cve-2019-3774
Source: CCN
Type: IBM Security Bulletin 6335281 (Data Risk Manager)
IBM Data Risk Manager is affected by multiple vulnerabilities
Source: CCN
Type: IBM Security Bulletin 6403331 (Security Guardium Data Encryption)
Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE)
Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-3774
Vulnerable Configuration:
Configuration 1
:
cpe:/a:pivotal_software:spring_batch:*:*:*:*:*:*:*:*
(Version <= 3.0.9)
OR
cpe:/a:pivotal_software:spring_batch:*:*:*:*:*:*:*:*
(Version >= 4.0.0 and <= 4.0.1)
OR
cpe:/a:pivotal_software:spring_batch:4.1.0:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:*
OR
cpe:/a:ibm:security_guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
pivotal_software
spring batch *
pivotal_software
spring batch *
pivotal_software
spring batch 4.1.0
ibm
data risk manager 2.0.6
ibm
security guardium data encryption 3.0.0.2