In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
References
Configurations
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/99873 - Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/b72c3a511592ec70729b3ec2d29302b6ce87bbeab62d4745617a6bd0%40%3Cdev.sling.apache.org%3E - |
07 Nov 2023, 02:34
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-07-19 15:29
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6798
Mitre link : CVE-2016-6798
CVE.ORG link : CVE-2016-6798
JSON object : View
Products Affected
apache
- sling
CWE
CWE-611
Improper Restriction of XML External Entity Reference