First published: Tue Nov 22 2005(Updated: )
The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Search Appliance | ||
Google Search Appliance Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-3757 is considered critical due to potential remote code execution and information disclosure vulnerabilities.
To fix CVE-2005-3757, ensure that you update the Google Mini Search Appliance or Google Search Appliance to the latest security patch provided by Google.
CVE-2005-3757 affects the Google Mini Search Appliance and Google Search Appliance.
CVE-2005-3757 allows remote attackers to execute arbitrary code by exploiting vulnerable XSLT style sheets.
No authentication is required to exploit CVE-2005-3757, allowing unauthenticated remote attackers to access the vulnerability.