HIGH · 8.8

CVE-2019-18213

XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with ...

Vulnerability Description

XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Xml Language Server ProjectXml Server Project< 0.9.1
EclipseWild Web Developer-
Theia Xml Extension ProjectTheia Xml Extension-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-18213?

CVE-2019-18213 is a vulnerability with a CVSS score of 8.8 (HIGH). XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with ...

How severe is CVE-2019-18213?

CVE-2019-18213 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-18213?

Check the references section above for vendor advisories and patch information. Affected products include: Xml Language Server Project Xml Server Project, Eclipse Wild Web Developer, Theia Xml Extension Project Theia Xml Extension.