CVE-2018-20433: XML External Entity Reference in mchange:c3p0
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84825%
CWE
Published
1/7/2019
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.mchange:c3p0 | maven | <= 0.9.5.2 | 0.9.5.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing in extractXmlConfigFromInputStream
. The commit diff shows the patch adds 'fact.setExpandEntityReferences(false)' to mitigate XXE, confirming the vulnerable code path. The CWE-611 classification and advisory descriptions explicitly reference this function as the entry point for the vulnerability during XML configuration parsing.