| Vulnerability Name: | CVE-2019-9658 (CCN-158130) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2019-02-24 | ||||||||||||||||||||||||||||||||||||
| Published: | 2019-02-24 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2020-10-01 | ||||||||||||||||||||||||||||||||||||
| Summary: | Checkstyle before 8.18 loads external DTDs by default. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-611 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-9658 Source: MISC Type: Release Notes, Vendor Advisory https://checkstyle.org/releasenotes.html#Release_8.18 Source: XF Type: UNKNOWN checkstyle-cve20199658-weak-security(158130) Source: MISC Type: Third Party Advisory https://github.com/checkstyle/checkstyle/issues/6474 Source: MISC Type: Third Party Advisory https://github.com/checkstyle/checkstyle/issues/6478 Source: CCN Type: Checkstyle GIT Repository Issue #6474: disable external dtd load by default #6476 Source: MISC Type: Third Party Advisory https://github.com/checkstyle/checkstyle/pull/6476 Source: MLIST Type: UNKNOWN [fluo-commits] 20190814 [fluo] branch fluo-parent updated: Update checkstyle (CVE-2019-9658) (#1073) Source: MLIST Type: Mailing List, Patch, Third Party Advisory [james-server-dev] 20190318 [james-project] 01/03: JAMES-2693 Update com.puppycrawl.tools:checkstyle to respond to CVE-2019-9658 Source: MLIST Type: UNKNOWN [fluo-notifications] 20190815 Build failed in Jenkins: Fluo Parent Pom #101 Source: MLIST Type: UNKNOWN [accumulo-notifications] 20190612 [GitHub] [accumulo-testing] milleruntime opened a new pull request #80: Update checkstyle Source: MLIST Type: UNKNOWN [fluo-notifications] 20190814 [GitHub] [fluo] ctubbsii merged pull request #1073: Update checkstyle (CVE-2019-9658) Source: MLIST Type: UNKNOWN [nifi-commits] 20200930 svn commit: r1882168 - /nifi/site/trunk/security.html Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20190428 [SECURITY] [DLA 1768-1] checkstyle security update Source: FEDORA Type: UNKNOWN FEDORA-2019-4696630d6f Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-a3f67e2364 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-e4405b4c9f Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-9658 | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||