An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.
To exploit the vulnerability, an attacker could create a file containing specially crafted XML content and convince an authenticated user to import the file.
The update addresses the vulnerability by modifying the way that the Event Viewer parses XML input.
References
Configurations
Configuration 1 (hide)
|
History
20 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.7 |
Summary | (en) An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration. To exploit the vulnerability, an attacker could create a file containing specially crafted XML content and convince an authenticated user to import the file. The update addresses the vulnerability by modifying the way that the Event Viewer parses XML input. | |
References |
|
21 Nov 2024, 04:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0948 - Patch, Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-19-641/ - |
Information
Published : 2019-06-12 14:29
Updated : 2025-05-20 18:15
NVD link : CVE-2019-0948
Mitre link : CVE-2019-0948
CVE.ORG link : CVE-2019-0948
JSON object : View
Products Affected
microsoft
- windows_10
- windows_server_2012
- windows_server_2019
- windows_7
- windows_server_2008
- windows_rt_8.1
- windows_server_2016
- windows_8.1
CWE
CWE-611
Improper Restriction of XML External Entity Reference