XML External Entity (XXE) Injection Affecting trino package, versions <453-r2


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.2% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about XML External Entity (XXE) Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-TRINO-7924807
  • published8 Sept 2024
  • disclosed11 Sept 2022

Introduced: 11 Sep 2022

CVE-2022-39135  (opens in a new tab)
CWE-611  (opens in a new tab)

How to fix?

Upgrade Chainguard trino to version 453-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream trino package and not the trino package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Apache Calcite 1.22.0 introduced the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, making them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typically by using Oracle dialect (the first three) or MySQL dialect (the last one), is affected by this vulnerability (the extent of it will depend on the user under which the application is running). From Apache Calcite 1.32.0 onwards, Document Type Declarations and XML External Entity resolution are disabled on the impacted operators.

CVSS Scores

version 3.1