GLSA Advocate

Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Apr 02, 2016 8:26 pm Post subject: [ GLSA 201604-02 ] Xalan-Java |
|
|
Gentoo Linux Security Advisory
Title: Xalan-Java: Arbitrary code execution (GLSA 201604-02)
Severity: normal
Exploitable: remote
Date: April 02, 2016
Bug(s): #505602
ID: 201604-02
Synopsis
Insufficient constraints in Apache's Xalan-Java might allow remote
attackers to execute arbitrary code and load arbitrary classes.
Background
Xalan-Java is an XSLT processor for transforming XML documents into
HTML, text, or other XML document types.
Affected Packages
Package: dev-java/xalan
Vulnerable: < 2.7.2
Unaffected: >= 2.7.2
Architectures: All supported architectures
Description
The TransformerFactory in Apache Xalan-Java does not properly restrict
access to certain properties when FEATURE_SECURE_PROCESSING is enabled.
This can also be exploited via a Java property that is bound to the XSLT
1.0 system-property function.
Impact
A remote attacker could inject specially crafted XSLT properties
resulting in the execution of arbitrary code with the privileges of the
process.
Workaround
There is no known work around at this time.
Resolution
All Xalan-Java users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/xalan-2.7.2"
|
References
CVE-2014-0107 |
|