CVE-2019-0188: XML External Entity injection in Apache Camel
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82645%
CWE
Published
5/29/2019
Updated
1/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.camel:camel-core | maven | < 2.24.0 | 2.24.0 |
org.apache.camel:camel-xmljson | maven | <= 2.23.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from camel-xmljson's use of JSON-lib for XML processing. While exact patch diffs aren't shown, the component removal and CVE description indicate that XML parsing/generation methods in XmlJsonDataFormat
using JSON-lib's XMLSerializer
would appear in call stacks when processing untrusted input. The confidence is high for unmarshal()
as it directly handles XML parsing, medium for others due to transitive dependency risks.