CVE-2014-0107

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

References

http://www.ocert.org/advisories/ocert-2014-002.html

https://issues.apache.org/jira/browse/XALANJ-2435

http://www.securityfocus.com/bid/66397

http://secunia.com/advisories/57563

http://svn.apache.org/viewvc?view=revision&revision=1581058

http://secunia.com/advisories/59369

http://secunia.com/advisories/59036

http://www-01.ibm.com/support/docview.wss?uid=swg21677145

http://secunia.com/advisories/59711

http://secunia.com/advisories/60502

http://www-01.ibm.com/support/docview.wss?uid=swg21681933

http://www-01.ibm.com/support/docview.wss?uid=swg21680703

http://rhn.redhat.com/errata/RHSA-2014-1351.html

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

https://security.gentoo.org/glsa/201604-02

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755

http://www-01.ibm.com/support/docview.wss?uid=swg21676093

http://www-01.ibm.com/support/docview.wss?uid=swg21674334

http://www.ibm.com/support/docview.wss?uid=swg21677967

http://secunia.com/advisories/59515

http://secunia.com/advisories/59291

http://secunia.com/advisories/59290

http://secunia.com/advisories/59247

http://secunia.com/advisories/59151

https://exchange.xforce.ibmcloud.com/vulnerabilities/92023

http://www.securitytracker.com/id/1034716

http://www.securitytracker.com/id/1034711

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.debian.org/security/2014/dsa-2886

http://rhn.redhat.com/errata/RHSA-2014-0348.html

http://rhn.redhat.com/errata/RHSA-2015-1888.html

https://www.tenable.com/security/tns-2018-15

https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

https://lists.apache.org/thread.html/[email protected]%3Cdev.drill.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.drill.apache.org%3E

https://www.oracle.com//security-alerts/cpujul2021.html

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://www.oracle.com/security-alerts/cpuoct2021.html

Details

Source: MITRE

Published: 2014-04-15

Updated: 2021-10-20

Type: CWE-264

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
119149Tenable SecurityCenter < 5.8.0 Multiple Vulnerabilities (TNS-2018-15)NessusMisc.
critical
90340GLSA-201604-02 : Xalan-Java: Arbitrary code executionNessusGentoo Local Security Checks
high
88053Oracle WebLogic Server Multiple Vulnerabilities (January 2016 CPU)NessusMisc.
high
88044Oracle WebCenter Sites Apache Xalan-Java Library Security Bypass (January 2016 CPU)NessusWindows
high
76373SuSE 11.3 Security Update : xalan-j2 (SAT Patch Number 9426)NessusSuSE Local Security Checks
high
76336openSUSE Security Update : xalan-j2 (openSUSE-SU-2014:0861-1)NessusSuSE Local Security Checks
high
74300RHEL 5 / 6 : JBoss EAP (RHSA-2014:0591)NessusRed Hat Local Security Checks
high
74137Ubuntu 10.04 LTS / 12.04 LTS / 13.10 : libxalan2-java vulnerability (USN-2218-1)NessusUbuntu Local Security Checks
high
73796RHEL 5 / 6 : JBoss EAP (RHSA-2014:0453)NessusRed Hat Local Security Checks
high
73653Amazon Linux AMI : xalan-j2 (ALAS-2014-325)NessusAmazon Linux Local Security Checks
high
73359Fedora 20 : xalan-j2-2.7.1-22.fc20 (2014-4443)NessusFedora Local Security Checks
high
73356Fedora 19 : xalan-j2-2.7.1-22.fc19 (2014-4426)NessusFedora Local Security Checks
high
73309CentOS 5 / 6 : xalan-j2 (CESA-2014:0348)NessusCentOS Local Security Checks
high
73296Scientific Linux Security Update : xalan-j2 on SL5.x, SL6.x i386/x86_64 (20140401)NessusScientific Linux Local Security Checks
high
73295RHEL 5 / 6 : xalan-j2 (RHSA-2014:0348)NessusRed Hat Local Security Checks
high
73294Oracle Linux 5 / 6 : xalan-j2 (ELSA-2014-0348)NessusOracle Linux Local Security Checks
high
73216Debian DSA-2886-1 : libxalan2-java - security updateNessusDebian Local Security Checks
high