Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rc2w-r4jq-7pfx

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью

Описание

Improper Authorization in Apache Xalan-Java

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Ссылки

Пакеты

Наименование

xalan:xalan

maven
Затронутые версииВерсия исправления

< 2.7.2

2.7.2

EPSS

Процентиль: 91%
0.06467
Низкий

Дефекты

CWE-285

Связанные уязвимости

ubuntu
больше 11 лет назад

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

redhat
больше 11 лет назад

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

nvd
больше 11 лет назад

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

debian
больше 11 лет назад

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not prop ...

oracle-oval
больше 11 лет назад

ELSA-2014-0348: xalan-j2 security update (IMPORTANT)

EPSS

Процентиль: 91%
0.06467
Низкий

Дефекты

CWE-285