Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWdwMzItN2gyOS1ycHht
Moderate severity vulnerability that affects com.puppycrawl.tools:checkstyle
Checkstyle prior to 8.18 loads external DTDs by default, which can potentially lead to denial of service attacks or the leaking of confidential information.
Permalink: https://github.com/advisories/GHSA-gp32-7h29-rpxmJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWdwMzItN2gyOS1ycHht
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 5 years ago
Updated: almost 2 years ago
CVSS Score: 5.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Percentage: 0.00788
EPSS Percentile: 0.81758
Identifiers: GHSA-gp32-7h29-rpxm, CVE-2019-9658
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-9658
- https://github.com/checkstyle/checkstyle/issues/6474
- https://github.com/checkstyle/checkstyle/issues/6478
- https://github.com/checkstyle/checkstyle/pull/6476
- https://checkstyle.org/releasenotes.html#Release_8.18
- https://github.com/advisories/GHSA-gp32-7h29-rpxm
- https://lists.apache.org/thread.html/6bf8bbbca826e883f09ba40bc0d319350e1d6d4cf4df7c9e399b2699@%3Ccommits.fluo.apache.org%3E
- https://lists.apache.org/thread.html/7eea10e7be4c21060cb1e79f6524c6e6559ba833b1465cd2870a56b9@%3Cserver-dev.james.apache.org%3E
- https://lists.apache.org/thread.html/994221405e940e148adcfd9cb24ffc6700bed70c7820c55a22559d26@%3Cnotifications.fluo.apache.org%3E
- https://lists.apache.org/thread.html/a35a8ccb316d4c2340710f610cba8058e87d5376259b35ef3ed2bf89@%3Cnotifications.accumulo.apache.org%3E
- https://lists.apache.org/thread.html/fff26ee7b59360a0264fef4e8ed9454ef652db2c39f2892a9ea1c9cb@%3Cnotifications.fluo.apache.org%3E
- https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/04/msg00029.html
- https://lists.fedoraproject.org/archives/list/[email protected]/message/2BMOPJ2XYE4LB2HM7OMSUBBIYEDUTLWE/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/AEYBAHYAV37WHMOXZYM2ZWF46FHON6YC/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/VJPT54USMGWT3Y6XVXLDEHKRUY2EI4OE/
Blast Radius: 16.7
Affected Packages
maven:com.puppycrawl.tools:checkstyle
Dependent packages: 163Dependent repositories: 1,425
Downloads:
Affected Version Ranges: < 8.18
Fixed in: 8.18
All affected versions: 6.1.1, 6.4.1, 6.8.1, 6.8.2, 6.10.1, 6.11.1, 6.11.2, 6.12.1, 6.14.1, 6.16.1, 7.1.1, 7.1.2, 7.5.1, 7.6.1, 7.8.1, 7.8.2, 8.10.1
All unaffected versions: 8.36.1, 8.36.2, 8.41.1, 8.45.1, 9.0.1, 9.2.1, 10.3.1, 10.3.2, 10.3.3, 10.3.4, 10.5.0, 10.6.0, 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.9.1, 10.9.2, 10.9.3, 10.10.0, 10.11.0, 10.12.0, 10.12.1, 10.12.2, 10.12.3, 10.12.4, 10.12.5, 10.12.6, 10.12.7, 10.13.0, 10.14.0, 10.14.1, 10.14.2, 10.15.0, 10.16.0, 10.17.0, 10.18.0, 10.18.1, 10.18.2, 10.19.0, 10.20.0, 10.20.1, 10.20.2