Products
Apache Xalan-J
- 10.1.0
- 9.18.0
- 8.16.0
Source
security@apache.org
Tags
CVE-2024-36522 details
Published : July 12, 2024, 1:15 p.m.
Last Modified : July 12, 2024, 4:34 p.m.
Last Modified : July 12, 2024, 4:34 p.m.
Description
The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-74 | Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
References
URL | Source |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/12/2 | security@apache.org |
https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc | security@apache.org |
This website uses the NVD API, but is not approved or certified by it.