The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.
References
Link | Resource |
---|---|
http://metasploit.com/research/vulns/google_proxystylesheet/ | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/15509 | Exploit Patch |
http://www.osvdb.org/20981 | Exploit Patch |
http://securitytracker.com/id?1015246 | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/17644 | Vendor Advisory |
http://www.vupen.com/english/advisories/2005/2500 | |
http://www.securityfocus.com/archive/1/417310/30/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-11-22 13:03
Updated : 2018-10-19 08:39
NVD link : CVE-2005-3757
Mitre link : CVE-2005-3757
JSON object : View
CWE
Products Affected
- search_appliance
- mini_search_appliance