Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0119

Опубликовано: 27 мая 2014
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by JBoss Web / Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same JBoss Web / Apache Tomcat instance.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Toolset 2.0devtoolset-2-tomcatNot affected
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 1othersWill not fix
Red Hat JBoss Enterprise Web Server 1tomcat5Will not fix
Red Hat JBoss Enterprise Web Server 1tomcat6Will not fix
Red Hat JBoss Operations Network 3jbosswebAffected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2014:103811.08.2014
Red Hat Enterprise Linux 7tomcatFixedRHSA-2014:103407.08.2014
Red Hat JBoss BPMS 6.0jbosswebFixedRHSA-2015:023417.02.2015

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-470
https://bugzilla.redhat.com/show_bug.cgi?id=1102038Tomcat/JBossWeb: XML parser hijack by malicious web application

EPSS

Процентиль: 90%
0.05441
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

nvd
около 11 лет назад

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

debian
около 11 лет назад

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 d ...

github
около 3 лет назад

Missing XML Validation in Apache Tomcat

oracle-oval
почти 11 лет назад

ELSA-2014-1034: tomcat security update (LOW)

EPSS

Процентиль: 90%
0.05441
Низкий

2.1 Low

CVSS2