-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2019-12415 - Medium Severity Vulnerability
Vulnerable Library - poi-ooxml-3.16.jar
Apache POI - Java API To Access Microsoft Format Files
Library home page: http://poi.apache.org/
Path to dependency file: cloud-pipeline/api/build.gradle
Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/org.apache.poi/poi-ooxml/3.16/76e20fe22404cc4da55ddfdaaaadee32bbfa3bdd/poi-ooxml-3.16.jar
Dependency Hierarchy:
- ❌ poi-ooxml-3.16.jar (Vulnerable Library)
Found in HEAD commit: 1db3170e0bd699acd5fec6e3fcebfa68fe86edcf
Found in base branch: develop
Vulnerability Details
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
Publish Date: 2019-10-23
URL: CVE-2019-12415
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12415
Release Date: 2019-10-23
Fix Resolution: 4.1.1
⛑️ Automatic Remediation is available for this issue