In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99873 | Third Party Advisory VDB Entry |
https://lists.apache.org/thread.html/b72c3a511592ec70729b3ec2d29302b6ce87bbeab62d4745617a6bd0%40%3Cdev.sling.apache.org%3E |
Configurations
History
No history.
Information
Published : 2017-07-19 15:29
Updated : 2024-02-04 19:29
NVD link : CVE-2016-6798
Mitre link : CVE-2016-6798
CVE.ORG link : CVE-2016-6798
JSON object : View
Products Affected
apache
- sling
CWE
CWE-611
Improper Restriction of XML External Entity Reference