PT-2019-5263 · Terracotta +3 · Terracotta Quartz Scheduler +3
Published
2019-07-22
·
Updated
2024-10-15
·
CVE-2019-13990
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Terracotta Quartz Scheduler versions through 2.3.0
Description:
The issue is related to the `initDocumentParser` function in the `xml/XMLSchedulingDataProcessor.java` file of the Terracotta Quartz Scheduler library, which is associated with incorrect restriction of XML external entity references. This can allow a remote attacker to perform an XXE (XML External Entity) attack. The vulnerability can be exploited via a job description.
Recommendations:
For Terracotta Quartz Scheduler versions through 2.3.0, update to a version later than 2.3.0 to resolve the issue. As a temporary workaround, consider restricting access to the `initDocumentParser` function in the `xml/XMLSchedulingDataProcessor.java` file until a patch is available. Avoid using the vulnerable `initDocumentParser` function in job descriptions until the issue is resolved.
Fix
XXE
Weakness Enumeration
Related Identifiers
Affected Products
References · 59
- https://osv.dev/vulnerability/CVE-2019-13990 · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/libquartz-java · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2019-13990 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-9qcf-c26r-x5rf · Vendor Advisory
- https://advisories.mageia.org/MGASA-2021-0133.html · Security Note
- https://osv.dev/vulnerability/MGASA-2021-0133 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2019-13990 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2020:1009-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2020:0984-1 · Vendor Advisory
- https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf%40%3Ccommits.tomee.apache.org%3E · Patch
- https://ubuntu.com/security/CVE-2019-13990 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2019-13990 · Security Note
- https://bdu.fstec.ru/vul/2020-02137 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2019-13990 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13990 · Security Note