|
Message-ID: <CAGaRif0TSpR9GYCMd3O5aFhA=N=qatnpeeq+0xL2jNOKp_0+KA@mail.gmail.com> Date: Fri, 4 Mar 2022 14:20:36 -0800 From: lewis john mcgibbney <lewismc@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2022-25312: An XML external entity (XXE) injection vulnerability exists in the Apache Any23 RDFa XSLTStylesheet extractor Description: An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. Resolution: This issue is fixed in Apache Any23 2.7 which can be downloaded from https://any23.apache.org/download.html. We strongly encourage all Any23 users to upgrade to Apache Any23 2.7. Credit: The Apache Any23 Project Management Committee would like to thank Lion Tree a.k.a liontree0110 for reporting this issue. -- http://home.apache.org/~lewismc/ http://people.apache.org/keys/committer/lewismc
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.