Show plain JSON{"id": "CVE-2019-7722", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}]}, "published": "2019-02-11T14:29:00.217", "references": [{"url": "https://github.com/pmd/pmd/issues/1650", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/pmd/pmd/issues/1650", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-611"}]}], "descriptions": [{"lang": "en", "value": "PMD 5.8.1 and earlier processes XML external entities in ruleset files it parses as part of the analysis process, allowing attackers tampering it (either by direct modification or MITM attacks when using remote rulesets) to perform information disclosure, denial of service, or request forgery attacks. (PMD 6.x is unaffected because of a 2017-09-15 change.)"}, {"lang": "es", "value": "PMD, en versiones 5.8.1 y anteriores, procesa las entidades externas XML en archivos de conjuntos de reglas que analiza como parte del proceso de an\u00e1lisis. Esto permite que los atacantes lo manipulen (ya sea mediante modificaci\u00f3n directa o ataques MitM al emplear conjuntos de reglas remotas) para realizar ataques de divulgaci\u00f3n de informaci\u00f3n, denegaci\u00f3n de servicio (DoS) o falsificaci\u00f3n de peticiones. (Las versiones 6.x de PMD no se han visto afectadas debido a un cambio efectuado el 15/09/2017)."}], "lastModified": "2024-11-21T04:48:34.903", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pmd_project:pmd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7961C7C4-FD94-4A98-9C65-D05AA6D49F50", "versionEndIncluding": "5.8.1"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}