Miggo Logo

CVE-2019-10782:
XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled))

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.64458%
Published
1/31/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.puppycrawl.tools:checkstylemaven< 8.298.29

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from an incomplete XXE fix where the original patch (CVE-2019-9658) missed disabling parameter entity processing. The commit c46a16d shows the addition of EXTERNAL_PARAMETER_ENTITIES handling to setFeaturesBySystemProperty, confirming this was the missing protection. Prior to version 8.29, this function's failure to disable all three XXE-related features (external DTD, general entities, and parameter entities) left the parser vulnerable when processing untrusted XML inputs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u* to *n in*ompl*t* *ix *or [*V*-****-****](*ttps://*v*.mitr*.or*/**i-*in/*v*n*m*.**i?n*m*=*V*-****-****), ****kstyl* w*s still vuln*r**l* to XML *xt*rn*l *ntity (XX*) Pro**ssin*. ### Imp**t #### Us*r: *uil* M*int*in*rs T*is vuln*r**ility pro***l

Reasoning

T** vuln*r**ility st*ms *rom *n in*ompl*t* XX* *ix w**r* t** ori*in*l p*t** (*V*-****-****) miss** *is**lin* p*r*m*t*r *ntity pro**ssin*. T** *ommit ******* s*ows t** ***ition o* *XT*RN*L_P*R*M*T*R_*NTITI*S **n*lin* to s*t***tur*s*ySyst*mProp*rty, *o