CVE-2019-11068

Severity
9.8CRITICAL
EPSS
1.1%
top 21.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 10
Latest updateMay 13

Description

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

Debianlibxslt< 1.1.32-2.1+3
NVDxmlsoft/libxslt1.1.33
RubyGemsnokogiri< 1.10.3
NVDoracle/jdk8.0

Also affects: Debian Linux 8.0, Fedora 29, 30, Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

4
OSV
Nokogiri vulnerable to libxslt protection mechanism bypass2022-05-13
GHSA
Nokogiri vulnerable to libxslt protection mechanism bypass2022-05-13
CVEList
CVE-2019-11068: libxslt through 12019-04-10
OSV
CVE-2019-11068: libxslt through 12019-04-10

📋Vendor Advisories

4
Ubuntu
Libxslt vulnerability2019-04-15
Ubuntu
Libxslt vulnerability2019-04-15
Red Hat
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL2019-04-10
Debian
CVE-2019-11068: libxslt - libxslt through 1.1.33 allows bypass of a protection mechanism because callers o...2019

💬Community

3
Bugzilla
CVE-2019-11068 libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL2019-05-14
Bugzilla
CVE-2019-11068 mingw-libxslt: libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL [fedora-all]2019-05-14
Bugzilla
CVE-2019-11068 libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL [fedora-all]2019-05-14
CVE-2019-11068 (CRITICAL CVSS 9.8) | libxslt through 1.1.33 allows bypas | cvebase.io