Hi there,
    I think the method
com.mchange.v2.c3p0.cfg.C3P0ConfigXmlUtils.extractXmlConfigFromInputStream(InputStream
is) may have an XXE vulnerability which is vulnerable in the
org.apache.kylin:kylin-job before version 0.7.2-incubating-job. It shares
similarities to a recent CVE disclosure CVE-2018-20433 in the
"swaldman/c3p0" project.
     The source vulnerability information is as follows:

> Vulnerability Detail:
> CVE Identifier: CVE-2018-20433
> c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in
> com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
> Reference:https://nvd.nist.gov/vuln/detail/CVE-2018-20433
> Patch: zhutougg/c3p0@2eb0ea9
> <https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b>


This may be caused by the fact that the version of c3p0, the component you
rely on, has not been updated. Maybe I can submit a PR to help you update
the version? Looking forward to your reply.

Best regards,
Yiheng Cao

Reply via email to