It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An attacker could use this flaw to cause remote code execution if they are able to provide XSLT content for parsing. Doing a transform in JAXP requires the use of a 'javax.xml.transform.TransformerFactory'. If the FEATURE_SECURE_PROCESSING feature is set to 'true', it mitigates this vulnerability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7465 | Mitigation Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/97605 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-06-27 16:29
Updated : 2023-02-12 23:30
NVD link : CVE-2017-7465
Mitre link : CVE-2017-7465
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
CWE
CWE-611
Improper Restriction of XML External Entity Reference