initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.

Project Subscriptions

Vendors Products
Atlassian Subscribe
Jira Service Management Subscribe
Active Iq Unified Manager Subscribe
Cloud Secure Agent Subscribe
Apache Batik Mapviewer Subscribe
Banking Enterprise Originations Subscribe
Banking Enterprise Product Manufacturing Subscribe
Banking Payments Subscribe
Communications Ip Service Activator Subscribe
Communications Session Route Manager Subscribe
Customer Management And Segmentation Foundation Subscribe
Documaker Subscribe
Enterprise Manager Base Platform Subscribe
Enterprise Manager Ops Center Subscribe
Flexcube Investor Servicing Subscribe
Flexcube Private Banking Subscribe
Fusion Middleware Mapviewer Subscribe
Google Guava Mapviewer Subscribe
Hyperion Infrastructure Technology Subscribe
Jd Edwards Enterpriseone Orchestrator Subscribe
Primavera Unifier Subscribe
Retail Back Office Subscribe
Retail Central Office Subscribe
Retail Integration Bus Subscribe
Retail Order Broker Subscribe
Retail Point-of-service Subscribe
Retail Returns Management Subscribe
Retail Xstore Point Of Service Subscribe
Terracotta Quartz Scheduler Mapviewer Subscribe
Webcenter Sites Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Rhev Manager Subscribe
Softwareag Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9qcf-c26r-x5rf XML external entity injection in Terracotta Quartz Scheduler
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://confluence.atlassian.com/security/ssot-117-cve-2019-13990-xxe-xml-external-entity-injection-vulnerability-in-jira-service-management-data-center-and-jira-service-management-server-1295385959.html cve-icon cve-icon
https://github.com/quartz-scheduler/quartz/issues/467 cve-icon cve-icon
https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82%40%3Cdev.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3%40%3Cdev.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949%40%3Cdev.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629%40%3Cdev.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa%40%3Ccommits.tomee.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-13990 cve-icon
https://security.netapp.com/advisory/ntap-20221028-0002/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-13990 cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.07947}

epss

{'score': 0.10416}


Tue, 15 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-15T18:22:20.316Z

Reserved: 2019-07-19T00:00:00.000Z

Link: CVE-2019-13990

cve-icon Vulnrichment

Updated: 2024-08-05T00:05:44.151Z

cve-icon NVD

Status : Modified

Published: 2019-07-26T19:15:11.730

Modified: 2024-11-21T04:25:50.490

Link: CVE-2019-13990

cve-icon Redhat

Severity : Important

Publid Date: 2019-07-26T00:00:00Z

Links: CVE-2019-13990 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses