It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An attacker could use this flaw to cause remote code execution if they are able to provide XSLT content for parsing. Doing a transform in JAXP requires the use of a 'javax.xml.transform.TransformerFactory'. If the FEATURE_SECURE_PROCESSING feature is set to 'true', it mitigates this vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97605 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7465 | Mitigation Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-06-27 16:29
Updated : 2024-02-04 19:46
NVD link : CVE-2017-7465
Mitre link : CVE-2017-7465
CVE.ORG link : CVE-2017-7465
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform