Description
c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.
Remediation
References
https://hackerone.com/reports/509315
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
Related Vulnerabilities
CVE-2020-15270 Vulnerability in npm package parse-server
CVE-2019-1010266 Vulnerability in maven package org.webjars.bower:lodash
CVE-2010-1587 Vulnerability in maven package org.apache.activemq:apache-activemq
CVE-2021-21160 Vulnerability in maven package org.webjars.npm:electron
CVE-2023-44487 Vulnerability in maven package io.netty:netty-codec-http2