[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2015-0254

Date: (C)2015-03-10   (M)2017-09-22
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) or (2) JSTL XML tag.

Reference:
SECTRACK-1034934
http://www.securityfocus.com/archive/1/archive/1/534772/100/0/threaded
BID-72809
RHSA-2015:1695
RHSA-2016:1838
RHSA-2016:1839
RHSA-2016:1840
RHSA-2016:1841
USN-2551-1
http://mail-archives.apache.org/mod_mbox/tomcat-taglibs-user/201502.mbox/%3C82207A16-6348-4DEE-877E-F7B87292576A%40apache.org%3E
http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
openSUSE-SU-2015:1751

CPE    3
cpe:/a:apache:standard_taglibs:1.2.1
cpe:/o:canonical:ubuntu_linux:14.10
cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
OVAL    7
oval:org.secpod.oval:def:702483
oval:org.secpod.oval:def:1501174
oval:org.secpod.oval:def:203720
oval:org.secpod.oval:def:26788
...

© 2013 SecPod Technologies