In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/b72c3a511592ec70729b3ec2d29302b6ce87bbeab62d4745617a6bd0@%3Cdev.sling.apache.org%3E | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/99873 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-07-19 08:29
Updated : 2017-07-25 08:10
NVD link : CVE-2016-6798
Mitre link : CVE-2016-6798
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
apache
- sling