CVE-2019-3773: Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.5372%
CWE
Published
1/25/2019
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.springframework.ws:spring-ws | maven | < 2.4.4 | 2.4.4 |
org.springframework.ws:spring-ws | maven | >= 3.0.0, <= 3.0.4 | 3.0.6 |
org.springframework.ws:spring-xml | maven | < 2.4.4 | 2.4.4 |
org.springframework.ws:spring-xml | maven | >= 3.0.0, <= 3.0.4 | 3.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper restriction of XML external entity processing. Analysis focuses on:
- Core XML parsing configuration points in Spring WS
- Message factory initialization sequences
- XPath processing components While exact patch diffs aren't provided, advisory notes indicate the fix involved disabling DTD/external entity support by default. The identified functions represent key XML processing entry points that would handle untrusted input and require secure configuration.