First published: Wed Oct 23 2019(Updated: )
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xml Language Server Project Xml Server Project | <0.9.1 | |
Eclipse Wild Web Developer | ||
Theia Xml Extension Project Theia Xml Extension |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18213 has a medium severity rating due to the potential for XML External Entity (XXE) attacks.
To fix CVE-2019-18213, update to version 0.9.1 or later of the XML Language Server.
CVE-2019-18213 allows for XXE attacks which can lead to SSRF and SMB connection initiation vulnerabilities.
CVE-2019-18213 affects the XML Language Server, Eclipse Wild Web Developer, and Theia XML Extension.
Yes, CVE-2019-18213 can be exploited through a crafted XML document, making it a significant security concern.