First published: Wed Oct 23 2019(Updated: )
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xml Language Server Project Xml Server Project | <0.9.1 | |
Eclipse Wild Web Developer | ||
Theia Xml Extension Project Theia Xml Extension |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-18212 is considered high due to the potential for remote file manipulation through directory traversal.
To fix CVE-2019-18212, upgrade the XML Language Server to version 0.9.1 or later.
CVE-2019-18212 affects the XML Language Server prior to version 0.9.1 and related products like Red Hat XML Language Support.
Yes, CVE-2019-18212 can lead to data breaches as it allows remote attackers to write to arbitrary files on the affected systems.
CVE-2019-18212 exploits a directory traversal vulnerability within the XML Language Server implementation.