Sun Java JRE XML Signature Command Injection (102993)

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that may allow arbitrary
command injection.

Description :

The version of Sun Java Runtime Environment (JRE) installed on the
remote host reportedly does not securely process XSLT stylesheets
containing XSLT Transforms in XML Signatures. If an attacker can pass
a specially crafted XSLT stylesheet to a trusted Java application
running on the remote host, arbitrary code could be executed, subject
to the privileges under which the application operates.

See also :

http://www.isecpartners.com/advisories/2007-04-dsig.txt
http://www.isecpartners.com/files/XMLDSIG_Command_Injection.pdf
http://www.securityfocus.com/archive/1/473552/30/0/threaded
http://www.nessus.org/u?c74c71d0

Solution :

Upgrade to Sun Java JDK and JRE 6 Update 2 or later and remove any
affected versions.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 25709 ()

Bugtraq ID: 24850

CVE ID: CVE-2007-3716

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now