It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An attacker could use this flaw to cause remote code execution if they are able to provide XSLT content for parsing. Doing a transform in JAXP requires the use of a 'javax.xml.transform.TransformerFactory'. If the FEATURE_SECURE_PROCESSING feature is set to 'true', it mitigates this vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97605 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7465 | Issue Tracking Mitigation Third Party Advisory |
http://www.securityfocus.com/bid/97605 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7465 | Issue Tracking Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.0 |
References | () http://www.securityfocus.com/bid/97605 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7465 - Issue Tracking, Mitigation, Third Party Advisory |
Information
Published : 2018-06-27 16:29
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7465
Mitre link : CVE-2017-7465
CVE.ORG link : CVE-2017-7465
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform