CVE Vulnerabilities

CVE-2017-18640

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

Published: Dec 12, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.6 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.

Weakness

The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.

Affected Software

NameVendorStart VersionEnd Version
SnakeyamlSnakeyaml_project*1.26 (excluding)
Red Hat AMQ Streams 1.8.0RedHatprometheus-jmx-exporter*
Red Hat build of Quarkus 1.3.4RedHatsnakeyaml*
Red Hat Enterprise Linux 8RedHatprometheus-jmx-exporter-0:0.12.0-6.el8*
Red Hat Fuse 7.9RedHatprometheus-jmx-exporter*
SnakeyamlUbuntubionic*
SnakeyamlUbuntudisco*
SnakeyamlUbuntueoan*
SnakeyamlUbuntuesm-apps/bionic*
SnakeyamlUbuntuesm-apps/focal*
SnakeyamlUbuntuesm-apps/xenial*
SnakeyamlUbuntuesm-infra-legacy/trusty*
SnakeyamlUbuntufocal*
SnakeyamlUbuntugroovy*
SnakeyamlUbuntuhirsute*
SnakeyamlUbuntuimpish*
SnakeyamlUbuntukinetic*
SnakeyamlUbuntulunar*
SnakeyamlUbuntumantic*
SnakeyamlUbuntutrusty*
SnakeyamlUbuntutrusty/esm*
SnakeyamlUbuntuupstream*
SnakeyamlUbuntuxenial*

Potential Mitigations

References