Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3757

Опубликовано: 22 нояб. 2005
Источник: debian
EPSS Высокий

Описание

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ooo2dbknot-affectedpackage

Примечания

  • XSLTs can call arbitrary java methods in libsaxon-java. This behaviour

  • is well documented and can be switched off. Let's hope that all users

  • of saxon are aware of this. A warning has been added to the readme.

  • Current rdependencies:

EPSS

Процентиль: 99%
0.75746
Высокий

Связанные уязвимости

nvd
почти 20 лет назад

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

github
больше 3 лет назад

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

EPSS

Процентиль: 99%
0.75746
Высокий