CVE-2019-17554

MEDIUM EXPLOITED

Apache Olingo < 4.6.0 - XXE

Title source: rule

Description

The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.

Exploits (1)

exploitdb WORKING POC
by Compass Security · textwebappsjava
https://www.exploit-db.com/exploits/47770

Scores

CVSS v3 5.5
EPSS 0.5253
EPSS Percentile 97.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2021-04-12
CWE
CWE-611
Status published
Products (3)
apache/olingo 4.0.0 - 4.6.0
org.apache.olingo/odata-client-core 4.0.0 - 4.7.0Maven
org.apache.olingo/odata-server-core 4.0.0 - 4.7.0Maven
Published Dec 04, 2019
Tracked Since Feb 18, 2026