CVE-2014-0107

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2014-0348.html
http://rhn.redhat.com/errata/RHSA-2014-1351.html
http://rhn.redhat.com/errata/RHSA-2015-1888.html
http://secunia.com/advisories/57563
http://secunia.com/advisories/59036
http://secunia.com/advisories/59151
http://secunia.com/advisories/59247
http://secunia.com/advisories/59290
http://secunia.com/advisories/59291
http://secunia.com/advisories/59369
http://secunia.com/advisories/59515
http://secunia.com/advisories/59711
http://secunia.com/advisories/60502
http://svn.apache.org/viewvc?view=revision&revision=1581058 Patch
http://www-01.ibm.com/support/docview.wss?uid=swg21674334
http://www-01.ibm.com/support/docview.wss?uid=swg21676093
http://www-01.ibm.com/support/docview.wss?uid=swg21677145
http://www-01.ibm.com/support/docview.wss?uid=swg21680703
http://www-01.ibm.com/support/docview.wss?uid=swg21681933
http://www.debian.org/security/2014/dsa-2886
http://www.ibm.com/support/docview.wss?uid=swg21677967
http://www.ocert.org/advisories/ocert-2014-002.html US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Patch Vendor Advisory
http://www.securityfocus.com/bid/66397
http://www.securitytracker.com/id/1034711
http://www.securitytracker.com/id/1034716
https://exchange.xforce.ibmcloud.com/vulnerabilities/92023
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://issues.apache.org/jira/browse/XALANJ-2435
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r0c00afcab8f238562e27b3ae7b8af1913c62bc60838fb8b34c19e26b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2900489bc665a2e32d021bb21f6ce2cb8e6bb5973490eebb9a346bca%40%3Cdev.tomcat.apache.org%3E
https://security.gentoo.org/glsa/201604-02
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.tenable.com/security/tns-2018-15
http://rhn.redhat.com/errata/RHSA-2014-0348.html
http://rhn.redhat.com/errata/RHSA-2014-1351.html
http://rhn.redhat.com/errata/RHSA-2015-1888.html
http://secunia.com/advisories/57563
http://secunia.com/advisories/59036
http://secunia.com/advisories/59151
http://secunia.com/advisories/59247
http://secunia.com/advisories/59290
http://secunia.com/advisories/59291
http://secunia.com/advisories/59369
http://secunia.com/advisories/59515
http://secunia.com/advisories/59711
http://secunia.com/advisories/60502
http://svn.apache.org/viewvc?view=revision&revision=1581058 Patch
http://www-01.ibm.com/support/docview.wss?uid=swg21674334
http://www-01.ibm.com/support/docview.wss?uid=swg21676093
http://www-01.ibm.com/support/docview.wss?uid=swg21677145
http://www-01.ibm.com/support/docview.wss?uid=swg21680703
http://www-01.ibm.com/support/docview.wss?uid=swg21681933
http://www.debian.org/security/2014/dsa-2886
http://www.ibm.com/support/docview.wss?uid=swg21677967
http://www.ocert.org/advisories/ocert-2014-002.html US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Patch Vendor Advisory
http://www.securityfocus.com/bid/66397
http://www.securitytracker.com/id/1034711
http://www.securitytracker.com/id/1034716
https://exchange.xforce.ibmcloud.com/vulnerabilities/92023
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://issues.apache.org/jira/browse/XALANJ-2435
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r0c00afcab8f238562e27b3ae7b8af1913c62bc60838fb8b34c19e26b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2900489bc665a2e32d021bb21f6ce2cb8e6bb5973490eebb9a346bca%40%3Cdev.tomcat.apache.org%3E
https://security.gentoo.org/glsa/201604-02
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.tenable.com/security/tns-2018-15
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:xalan-java:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xalan-java:2.7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:webcenter_sites:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2014-0348.html - () http://rhn.redhat.com/errata/RHSA-2014-0348.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1351.html - () http://rhn.redhat.com/errata/RHSA-2014-1351.html -
References () http://rhn.redhat.com/errata/RHSA-2015-1888.html - () http://rhn.redhat.com/errata/RHSA-2015-1888.html -
References () http://secunia.com/advisories/57563 - () http://secunia.com/advisories/57563 -
References () http://secunia.com/advisories/59036 - () http://secunia.com/advisories/59036 -
References () http://secunia.com/advisories/59151 - () http://secunia.com/advisories/59151 -
References () http://secunia.com/advisories/59247 - () http://secunia.com/advisories/59247 -
References () http://secunia.com/advisories/59290 - () http://secunia.com/advisories/59290 -
References () http://secunia.com/advisories/59291 - () http://secunia.com/advisories/59291 -
References () http://secunia.com/advisories/59369 - () http://secunia.com/advisories/59369 -
References () http://secunia.com/advisories/59515 - () http://secunia.com/advisories/59515 -
References () http://secunia.com/advisories/59711 - () http://secunia.com/advisories/59711 -
References () http://secunia.com/advisories/60502 - () http://secunia.com/advisories/60502 -
References () http://svn.apache.org/viewvc?view=revision&revision=1581058 - Patch () http://svn.apache.org/viewvc?view=revision&revision=1581058 - Patch
References () http://www-01.ibm.com/support/docview.wss?uid=swg21674334 - () http://www-01.ibm.com/support/docview.wss?uid=swg21674334 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676093 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676093 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21677145 - () http://www-01.ibm.com/support/docview.wss?uid=swg21677145 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21680703 - () http://www-01.ibm.com/support/docview.wss?uid=swg21680703 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21681933 - () http://www-01.ibm.com/support/docview.wss?uid=swg21681933 -
References () http://www.debian.org/security/2014/dsa-2886 - () http://www.debian.org/security/2014/dsa-2886 -
References () http://www.ibm.com/support/docview.wss?uid=swg21677967 - () http://www.ibm.com/support/docview.wss?uid=swg21677967 -
References () http://www.ocert.org/advisories/ocert-2014-002.html - US Government Resource () http://www.ocert.org/advisories/ocert-2014-002.html - US Government Resource
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -
References () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/66397 - () http://www.securityfocus.com/bid/66397 -
References () http://www.securitytracker.com/id/1034711 - () http://www.securitytracker.com/id/1034711 -
References () http://www.securitytracker.com/id/1034716 - () http://www.securitytracker.com/id/1034716 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/92023 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/92023 -
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755 - () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755 -
References () https://issues.apache.org/jira/browse/XALANJ-2435 - () https://issues.apache.org/jira/browse/XALANJ-2435 -
References () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E - () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E -
References () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E - () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E -
References () https://lists.apache.org/thread.html/r0c00afcab8f238562e27b3ae7b8af1913c62bc60838fb8b34c19e26b%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/r0c00afcab8f238562e27b3ae7b8af1913c62bc60838fb8b34c19e26b%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/r2900489bc665a2e32d021bb21f6ce2cb8e6bb5973490eebb9a346bca%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/r2900489bc665a2e32d021bb21f6ce2cb8e6bb5973490eebb9a346bca%40%3Cdev.tomcat.apache.org%3E -
References () https://security.gentoo.org/glsa/201604-02 - () https://security.gentoo.org/glsa/201604-02 -
References () https://www.oracle.com//security-alerts/cpujul2021.html - () https://www.oracle.com//security-alerts/cpujul2021.html -
References () https://www.oracle.com/security-alerts/cpuoct2021.html - () https://www.oracle.com/security-alerts/cpuoct2021.html -
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -
References () https://www.tenable.com/security/tns-2018-15 - () https://www.tenable.com/security/tns-2018-15 -

07 Nov 2023, 02:18

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r0c00afcab8f238562e27b3ae7b8af1913c62bc60838fb8b34c19e26b@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20210823 [Bug 65516] New: upgrade to xalan 2.7.2 to address CVE-2014-0107', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/r2900489bc665a2e32d021bb21f6ce2cb8e6bb5973490eebb9a346bca@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20210823 [Bug 65516] upgrade to xalan 2.7.2 to address CVE-2014-0107', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'name': '[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'name': '[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E -
  • () https://lists.apache.org/thread.html/r0c00afcab8f238562e27b3ae7b8af1913c62bc60838fb8b34c19e26b%40%3Cdev.tomcat.apache.org%3E -
  • () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E -
  • () https://lists.apache.org/thread.html/r2900489bc665a2e32d021bb21f6ce2cb8e6bb5973490eebb9a346bca%40%3Cdev.tomcat.apache.org%3E -

Information

Published : 2014-04-15 23:13

Updated : 2024-11-21 02:01


NVD link : CVE-2014-0107

Mitre link : CVE-2014-0107

CVE.ORG link : CVE-2014-0107


JSON object : View

Products Affected

oracle

  • webcenter_sites

apache

  • xalan-java
CWE
CWE-264

Permissions, Privileges, and Access Controls