Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5661

Опубликовано: 18 апр. 2017
Источник: debian
EPSS Низкий

Описание

In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
fopfixed1:2.1-6package

Примечания

  • https://www.openwall.com/lists/oss-security/2017/04/18/2

  • Upstream bug: https://issues.apache.org/jira/browse/FOP-2668

  • Fixed by: http://svn.apache.org/r1769967

  • Fixed by: http://svn.apache.org/r1769968 (fix for Java 6)

EPSS

Процентиль: 84%
0.0211
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 9 лет назад

In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

CVSS3: 7.5
redhat
почти 9 лет назад

In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

CVSS3: 7.3
nvd
почти 9 лет назад

In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

CVSS3: 7.3
github
больше 3 лет назад

Improper Restriction of XML External Entity Reference in Apache FOP

EPSS

Процентиль: 84%
0.0211
Низкий