Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-34169

Опубликовано: 19 июл. 2022
Источник: redhat
CVSS3: 7.5
EPSS Средний

Описание

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Migration Toolkit for Applications 6xalanWill not fix
Migration Toolkit for RuntimesxalanNot affected
Red Hat AMQ Broker 7xalanNot affected
Red Hat build of Apache Camel 4 for Quarkus 3xalanAffected
Red Hat build of Apache Camel for Spring Boot 3xalanAffected
Red Hat build of Apache Camel for Spring Boot 4xalanNot affected
Red Hat Build of KeycloakxalanAffected
Red Hat build of OptaPlanner 8xalanAffected
Red Hat Data Grid 8xalanNot affected
Red Hat Enterprise Linux 6java-1.6.0-openjdkOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-192
https://bugzilla.redhat.com/show_bug.cgi?id=2108554OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

EPSS

Процентиль: 93%
0.1173
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

CVSS3: 7.5
nvd
почти 3 года назад

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

CVSS3: 7.5
debian
почти 3 года назад

The Apache Xalan Java XSLT library is vulnerable to an integer truncat ...

suse-cvrf
7 месяцев назад

Recommended update for mojo-parent

CVSS3: 7.5
github
почти 3 года назад

Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets

EPSS

Процентиль: 93%
0.1173
Средний

7.5 High

CVSS3

Уязвимость CVE-2022-34169