[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2014-1034 -- Oracle tomcat

ID: oval:org.secpod.oval:def:1500676Date: (C)2014-08-20   (M)2018-05-10
Class: PATCHFamily: unix




It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same Apache Tomcat instance.

Platform:
Oracle Linux 7
Product:
tomcat
Reference:
ELSA-2014-1034
CVE-2013-4590
CVE-2014-0119
CVE-2014-0099
CVE-2014-0096
CVE-2014-0075
CVE    5
CVE-2014-0075
CVE-2013-4590
CVE-2014-0099
CVE-2014-0096
...
CPE    209
cpe:/a:apache:tomcat:3.3.1a
cpe:/a:apache:tomcat:4.1.10
cpe:/a:apache:tomcat:4.1.15
cpe:/a:apache:tomcat:4.1.12
...

© SecPod Technologies