{"id":"CVE-2019-5427","details":"c3p0 version \u003c 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.","aliases":["GHSA-84p2-vf58-xhxv"],"modified":"2026-04-16T04:39:39.448508231Z","published":"2019-04-22T21:29:00.523Z","related":["SUSE-SU-2022:0798-1","SUSE-SU-2022:1397-1","openSUSE-SU-2024:11961-1"],"references":[{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"https://hackerone.com/reports/509315"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zhutougg/c3p0","events":[{"introduced":"0"},{"fixed":"c79fde67016f0999045414e881769cb5660c8654"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.9.5.4"}]}}],"versions":["c3p0-0.9.2","c3p0-0.9.2-pre2-RELEASE","c3p0-0.9.2-pre3","c3p0-0.9.2-pre4","c3p0-0.9.2-pre6","c3p0-0.9.2-pre7","c3p0-0.9.2-pre8","c3p0-0.9.5-pre1","c3p0-0.9.5-pre2","c3p0-0.9.5-pre3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-5427.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4.0"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"12.6.0"},{"last_affected":"12.6.6"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.2.4"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"17.0"}]},{"events":[{"introduced":"0"},{"last_affected":"18.0"}]},{"events":[{"introduced":"0"},{"last_affected":"19.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}