Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-0254

Опубликовано: 27 фев. 2015
Источник: redhat
CVSS3: 7.6
CVSS2: 6.8
EPSS Низкий

Описание

Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.

It was found that the Java Standard Tag Library (JSTL) allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.

Отчет

Users of EAP 6.x and 7.0 should upgrade to at least 6.4.9 and pass the following system property on startup to prevent XXE attacks in JSTL: org.apache.taglibs.standard.xml.accessExternalEntity=false For more details please see refer to this KCS solution: https://access.redhat.com/solutions/1584363

Меры по смягчению последствий

Users should upgrade to Apache Standard Taglibs 1.2.3 or later. This version uses JAXP’s FEATURE_SECURE_PROCESSING to restrict XML processing. Depending on the Java runtime version in use, additional configuration may be required: Java8: External entity access is automatically disabled if a SecurityManager is active. Java7: JAXP properties may need to be used to disable external access. See http://docs.oracle.com/javase/tutorial/jaxp/properties/properties.html Java6 and earlier: A new system property org.apache.taglibs.standard.xml.accessExternalEntity may be used to specify the protocols that can be used to access external entities. This defaults to "all" if no SecurityManager is present and to "" (thereby disabling access) if a SecurityManager is detected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5jakarta-taglibs-standardAffected
Red Hat Enterprise Linux 7jettyAffected
Red Hat JBoss BRMS 5webWill not fix
Red Hat JBoss Enterprise Application Platform 5webAffected
Red Hat JBoss Enterprise Web Server 1eap7Affected
Red Hat JBoss Enterprise Web Server 1tomcat6Not affected
Red Hat JBoss Enterprise Web Server 3tomcat7Not affected
Red Hat JBoss Operations Network 3jbossasWill not fix
Red Hat Satellite 5.4jakarta-taglibs-standardNot affected
Red Hat Satellite 5.5jakarta-taglibs-standardNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1198606jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags

EPSS

Процентиль: 92%
0.09152
Низкий

7.6 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.

nvd
больше 10 лет назад

Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.

debian
больше 10 лет назад

Apache Standard Taglibs before 1.2.3 allows remote attackers to execut ...

suse-cvrf
около 8 лет назад

Security update for jakarta-taglibs-standard

suse-cvrf
около 8 лет назад

Security update for jakarta-taglibs-standard

EPSS

Процентиль: 92%
0.09152
Низкий

7.6 High

CVSS3

6.8 Medium

CVSS2