First published: Tue Mar 25 2014(Updated: )
Apache Xalan-Java could allow a remote attacker to bypass security restrictions, caused by the improper handling of output properties. An attacker could exploit this vulnerability to bypass the secure processing feature to load arbitrary restricted classes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xalan-j2 | <2.7.2 | 2.7.2 |
Apache Xalan-Java | <=2.7.1 | |
Apache Xalan-Java | =1.0.0 | |
Apache Xalan-Java | =2.0.0 | |
Apache Xalan-Java | =2.0.1 | |
Apache Xalan-Java | =2.1.0 | |
Apache Xalan-Java | =2.2.0 | |
Apache Xalan-Java | =2.4.0 | |
Apache Xalan-Java | =2.4.1 | |
Apache Xalan-Java | =2.5.0 | |
Apache Xalan-Java | =2.5.1 | |
Apache Xalan-Java | =2.5.2 | |
Apache Xalan-Java | =2.6.0 | |
Apache Xalan-Java | =2.7.0 | |
Oracle WebCenter Sites | =7.6.2 | |
Oracle WebCenter Sites | =11.1.1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in Apache Xalan-Java is CVE-2014-0107.
CVE-2014-0107 can allow a remote attacker to bypass security restrictions and load arbitrary classes or access external resources.
The severity of CVE-2014-0107 is high with a CVSS score of 7.
To fix CVE-2014-0107, update your Apache Xalan-Java installation to version 2.7.2 or above.
You can find more information about CVE-2014-0107 in the following references: [Link 1](https://issues.apache.org/jira/browse/XALANJ-2435), [Link 2](http://svn.apache.org/viewvc?view=revision&revision=1581058), [Link 3](http://www.ocert.org/advisories/ocert-2014-002.html).