Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
6 vulnerabilities found for xml_server_project by xml_language_server_project
FKIE_CVE-2019-18212
Vulnerability from fkie_nvd - Published: 2019-10-23 22:15 - Updated: 2024-11-21 04:32
Severity ?
Summary
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| xml_language_server_project | xml_server_project | * | |
| eclipse | wild_web_developer | - | |
| theia_xml_extension_project | theia_xml_extension | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xml_language_server_project:xml_server_project:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3017DAF6-F5EE-4602-8872-764B836AA892",
"versionEndExcluding": "0.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:wild_web_developer:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C58360B6-2055-4FBE-A573-B7E5D7862274",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:theia_xml_extension_project:theia_xml_extension:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72125F1F-BE38-444C-9DCA-37E3D7D97DB7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal."
},
{
"lang": "es",
"value": "El archivo XMLLanguageService.java en XML Language Server (tambi\u00e9n se conoce como lsp4xml) versiones anteriores a 0.9.1, como es usado en Red Hat XML Language Support (tambi\u00e9n se conoce como vscode-xml) versiones anteriores a 0.9.1 para Visual Studio y otros productos, permite que un atacante remoto escriba en archivos arbitrarios por medio de salto de directorio."
}
],
"id": "CVE-2019-18212",
"lastModified": "2024-11-21T04:32:50.553",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-10-23T22:15:10.867",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-18213
Vulnerability from fkie_nvd - Published: 2019-10-23 22:15 - Updated: 2024-11-21 04:32
Severity ?
Summary
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| xml_language_server_project | xml_server_project | * | |
| eclipse | wild_web_developer | - | |
| theia_xml_extension_project | theia_xml_extension | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xml_language_server_project:xml_server_project:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3017DAF6-F5EE-4602-8872-764B836AA892",
"versionEndExcluding": "0.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:wild_web_developer:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C58360B6-2055-4FBE-A573-B7E5D7862274",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:theia_xml_extension_project:theia_xml_extension:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72125F1F-BE38-444C-9DCA-37E3D7D97DB7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java."
},
{
"lang": "es",
"value": "XML Language Server (tambi\u00e9n se conoce como lsp4xml) versiones anteriores a 0.9.1, como es usado en Red Hat XML Language Support (tambi\u00e9n se conoce como vscode-xml) versiones anteriores a 0.9.1, para Visual Studio y otros productos, permite un ataque de tipo XXE por medio de un documento XML dise\u00f1ado, con un SSRF resultante (as\u00ed como con el inicio de la conexi\u00f3n SMB lo que puede conllevar a la captura de desaf\u00edo y respuesta de NetNTLM para descifrar contrase\u00f1as). Esto ocurre en el archivo extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java."
}
],
"id": "CVE-2019-18213",
"lastModified": "2024-11-21T04:32:50.700",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-10-23T22:15:10.943",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2019-18213 (GCVE-0-2019-18213)
Vulnerability from cvelistv5 – Published: 2019-10-23 21:06 – Updated: 2024-08-05 01:47
VLAI?
Summary
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:47:14.103Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-24T20:16:44.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18213",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/angelozerr/lsp4xml/",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"name": "https://github.com/redhat-developer/vscode-xml/",
"refsource": "MISC",
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"name": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml",
"refsource": "MISC",
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"name": "https://github.com/angelozerr/lsp4xml/pull/566",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"name": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others",
"refsource": "CONFIRM",
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"name": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/",
"refsource": "MISC",
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-18213",
"datePublished": "2019-10-23T21:06:46.000Z",
"dateReserved": "2019-10-19T00:00:00.000Z",
"dateUpdated": "2024-08-05T01:47:14.103Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-18212 (GCVE-0-2019-18212)
Vulnerability from cvelistv5 – Published: 2019-10-23 21:05 – Updated: 2024-08-05 01:47
VLAI?
Summary
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:47:13.990Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-24T20:15:31.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18212",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/angelozerr/lsp4xml/",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"name": "https://github.com/redhat-developer/vscode-xml/",
"refsource": "MISC",
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"name": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml",
"refsource": "MISC",
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"name": "https://github.com/angelozerr/lsp4xml/pull/567",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"name": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others",
"refsource": "CONFIRM",
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"name": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/",
"refsource": "MISC",
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-18212",
"datePublished": "2019-10-23T21:05:32.000Z",
"dateReserved": "2019-10-19T00:00:00.000Z",
"dateUpdated": "2024-08-05T01:47:13.990Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-18213 (GCVE-0-2019-18213)
Vulnerability from nvd – Published: 2019-10-23 21:06 – Updated: 2024-08-05 01:47
VLAI?
Summary
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:47:14.103Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-24T20:16:44.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18213",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/angelozerr/lsp4xml/",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"name": "https://github.com/redhat-developer/vscode-xml/",
"refsource": "MISC",
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"name": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml",
"refsource": "MISC",
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"name": "https://github.com/angelozerr/lsp4xml/pull/566",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/pull/566"
},
{
"name": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others",
"refsource": "CONFIRM",
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"name": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/",
"refsource": "MISC",
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-18213",
"datePublished": "2019-10-23T21:06:46.000Z",
"dateReserved": "2019-10-19T00:00:00.000Z",
"dateUpdated": "2024-08-05T01:47:14.103Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-18212 (GCVE-0-2019-18212)
Vulnerability from nvd – Published: 2019-10-23 21:05 – Updated: 2024-08-05 01:47
VLAI?
Summary
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:47:13.990Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-24T20:15:31.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18212",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/angelozerr/lsp4xml/",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/"
},
{
"name": "https://github.com/redhat-developer/vscode-xml/",
"refsource": "MISC",
"url": "https://github.com/redhat-developer/vscode-xml/"
},
{
"name": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml",
"refsource": "MISC",
"url": "https://marketplace.visualstudio.com/items?itemName=redhat.vscode-xml"
},
{
"name": "https://github.com/angelozerr/lsp4xml/pull/567",
"refsource": "MISC",
"url": "https://github.com/angelozerr/lsp4xml/pull/567"
},
{
"name": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others",
"refsource": "CONFIRM",
"url": "https://github.com/angelozerr/lsp4xml/blob/master/CHANGELOG.md#others"
},
{
"name": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/",
"refsource": "MISC",
"url": "https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-18212",
"datePublished": "2019-10-23T21:05:32.000Z",
"dateReserved": "2019-10-19T00:00:00.000Z",
"dateUpdated": "2024-08-05T01:47:13.990Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}