Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0096

Опубликовано: 27 мая 2014
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

It was found that the org.apache.catalina.servlets.DefaultServlet implementation in JBoss Web / Apache Tomcat allowed the definition of XML External Entities (XXEs) in provided XSLTs. A malicious application could use this to circumvent intended security restrictions to disclose sensitive information.

Отчет

This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Low security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 1othersWill not fix
Red Hat JBoss Enterprise Web Server 1tomcat5Will not fix
Red Hat JBoss Enterprise Web Server 1tomcat6Will not fix
Red Hat JBoss Operations Network 3jbosswebNot affected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2014:086509.07.2014
Red Hat Enterprise Linux 7tomcatFixedRHSA-2014:082702.07.2014
Red Hat JBoss BPMS 6.0jbosswebFixedRHSA-2015:023417.02.2015
Red Hat JBoss BRMS 6.0jbosswebFixedRHSA-2015:023517.02.2015

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=1088342Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs

EPSS

Процентиль: 81%
0.01617
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

nvd
около 11 лет назад

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

debian
около 11 лет назад

java/org/apache/catalina/servlets/DefaultServlet.java in the default s ...

github
около 3 лет назад

Improper Input Validation in Apache Tomcat

fstec
около 11 лет назад

Уязвимость программного обеспечения Apache Tomcat, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

EPSS

Процентиль: 81%
0.01617
Низкий

2.1 Low

CVSS2