Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAGaRif0TSpR9GYCMd3O5aFhA=N=qatnpeeq+0xL2jNOKp_0+KA@mail.gmail.com>
Date: Fri, 4 Mar 2022 14:20:36 -0800
From: lewis john mcgibbney <lewismc@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-25312: An XML external entity (XXE) injection vulnerability
 exists in the Apache Any23 RDFa XSLTStylesheet extractor

Description:

An XML external entity (XXE) injection vulnerability was discovered in
the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23
versions < 2.7. XML external entity injection (also known as XXE) is a
web security vulnerability that allows an attacker to interfere with
an application's processing of XML data. It often allows an attacker
to view files on the application server filesystem, and to interact
with any back-end or external systems that the application itself can
access.

Resolution:

This issue is fixed in Apache Any23 2.7 which can be downloaded from
https://any23.apache.org/download.html. We strongly encourage all
Any23 users to upgrade to Apache Any23 2.7.

Credit:

The Apache Any23 Project Management Committee would like to thank Lion
Tree a.k.a liontree0110 for reporting this issue.


-- 
http://home.apache.org/~lewismc/
http://people.apache.org/keys/committer/lewismc

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.