GHSA-763g-fqq7-48wg

Suggest an improvement
Source
https://github.com/advisories/GHSA-763g-fqq7-48wg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/01/GHSA-763g-fqq7-48wg/GHSA-763g-fqq7-48wg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-763g-fqq7-48wg
Aliases
Published
2020-01-31T18:00:07Z
Modified
2023-11-08T04:00:56.662196Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled))
Details

Due to an incomplete fix for CVE-2019-9658, checkstyle was still vulnerable to XML External Entity (XXE) Processing.

Impact

User: Build Maintainers

This vulnerability probably doesn't impact Maven/Gradle users as, in most cases, these builds are processing files that are trusted, or pre-vetted by a pull request reviewer before being run on internal CI infrastructure.

User: Static Analysis as a Service

If you operate a site/service that parses "untrusted" Checkstyle XML configuration files, you are vulnerable to this and should patch.

Note from the discoverer of the original CVE-2019-9658:

While looking at a few companies that run Checkstyle/PMD/ect... as a service I notice that it's a common pattern to run the static code analysis tool inside of a Docker container with the following flags:

--net=none \
--privileged=false \
--cap-drop=ALL

Running the analysis in Docker has the advantage that there should be no sensitive local file information that XXE can exfiltrate from the container. Additionally, these flags prevent vulnerabilities in static analysis tools like Checkstyle from being used to exfiltrate data via XXE or to perform SSRF. - Jonathan Leitschuh

Patches

Has the problem been patched? What versions should users upgrade to?

Patched, will be released with version 8.29 at 26 Jan 2020.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

No workaround are available

References

For more information

If you have any questions or comments about this advisory: * Open an issue in https://github.com/checkstyle/checkstyle/issues

References

Affected packages

Maven / com.puppycrawl.tools:checkstyle

Package

Name
com.puppycrawl.tools:checkstyle
View open source insights on deps.dev
Purl
pkg:maven/com.puppycrawl.tools/checkstyle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.29

Affected versions

5.*

5.2
5.3
5.4
5.5
5.6
5.7
5.8
5.9

6.*

6.0
6.1
6.1.1
6.2
6.3
6.4
6.4.1
6.5
6.6
6.7
6.8
6.8.1
6.8.2
6.9
6.10
6.10.1
6.11
6.11.1
6.11.2
6.12
6.12.1
6.13
6.14
6.14.1
6.15
6.16
6.16.1
6.17
6.18
6.19

7.*

7.0
7.1
7.1.1
7.1.2
7.2
7.3
7.4
7.5
7.5.1
7.6
7.6.1
7.7
7.8
7.8.1
7.8.2

8.*

8.0
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.10.1
8.11
8.12
8.13
8.14
8.15
8.16
8.17
8.18
8.19
8.20
8.21
8.22
8.23
8.24
8.25
8.26
8.27
8.28