ELSA-2014-1034 -- Oracle tomcat
|ID: oval:org.secpod.oval:def:1500676||Date: (C)2014-08-20 (M)2017-12-06|
|Class: PATCH||Family: unix|
It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same Apache Tomcat instance.