7.5
CWE
681
Advisory Published
Advisory Published
Updated

CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets

First published: Tue Jul 19 2022(Updated: )

An integer truncation issue was found in the Xalan Java XSLT library when processing malicious stylesheets. This flaw could be used to potentially execute arbitrary Java bytecode.

Credit: security@apache.org security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
debian/bcel<=6.2-1
6.2-1+deb10u1
6.5.0-1+deb11u1
6.5.0-2
debian/openjdk-11
11.0.16+8-1~deb10u1
11.0.21+9-1~deb10u1
11.0.20+8-1~deb11u1
11.0.21+9-1~deb11u1
11.0.21+9-1
debian/openjdk-17
17.0.7+7-1~deb11u1
17.0.8+7-1~deb12u1
17.0.9+9-1
debian/openjdk-8
8u392-ga-1
maven/xalan:xalan<2.7.3
2.7.3
Apache Xalan-Java<=2.7.2
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Oracle GraalVM=20.3.6
Oracle GraalVM=21.3.2
Oracle GraalVM=22.1.0
Oracle JDK=1.7.0-update343
Oracle JDK=1.8.0-update333
Oracle JDK=11.0.15.1
Oracle JDK=17.0.3.1
Oracle JDK=18.0.1.1
Oracle JRE=1.7.0-update343
Oracle JRE=1.8.0-update333
Oracle JRE=11.0.15.1
Oracle JRE=17.0.3.1
Oracle JRE=18.0.1.1
Oracle OpenJDK>=11<=11.0.15
Oracle OpenJDK>=13<=13.0.11
Oracle OpenJDK>=15<=15.0.7
Oracle OpenJDK>=17<=17.0.3
Oracle OpenJDK=7
Oracle OpenJDK=7-update1
Oracle OpenJDK=7-update10
Oracle OpenJDK=7-update101
Oracle OpenJDK=7-update11
Oracle OpenJDK=7-update111
Oracle OpenJDK=7-update121
Oracle OpenJDK=7-update13
Oracle OpenJDK=7-update131
Oracle OpenJDK=7-update141
Oracle OpenJDK=7-update15
Oracle OpenJDK=7-update151
Oracle OpenJDK=7-update161
Oracle OpenJDK=7-update17
Oracle OpenJDK=7-update171
Oracle OpenJDK=7-update181
Oracle OpenJDK=7-update191
Oracle OpenJDK=7-update2
Oracle OpenJDK=7-update201
Oracle OpenJDK=7-update21
Oracle OpenJDK=7-update211
Oracle OpenJDK=7-update221
Oracle OpenJDK=7-update231
Oracle OpenJDK=7-update241
Oracle OpenJDK=7-update25
Oracle OpenJDK=7-update251
Oracle OpenJDK=7-update261
Oracle OpenJDK=7-update271
Oracle OpenJDK=7-update281
Oracle OpenJDK=7-update291
Oracle OpenJDK=7-update3
Oracle OpenJDK=7-update301
Oracle OpenJDK=7-update311
Oracle OpenJDK=7-update321
Oracle OpenJDK=7-update4
Oracle OpenJDK=7-update40
Oracle OpenJDK=7-update45
Oracle OpenJDK=7-update5
Oracle OpenJDK=7-update51
Oracle OpenJDK=7-update55
Oracle OpenJDK=7-update6
Oracle OpenJDK=7-update60
Oracle OpenJDK=7-update65
Oracle OpenJDK=7-update67
Oracle OpenJDK=7-update7
Oracle OpenJDK=7-update72
Oracle OpenJDK=7-update76
Oracle OpenJDK=7-update80
Oracle OpenJDK=7-update85
Oracle OpenJDK=7-update9
Oracle OpenJDK=7-update91
Oracle OpenJDK=7-update95
Oracle OpenJDK=7-update97
Oracle OpenJDK=7-update99
Oracle OpenJDK=8
Oracle OpenJDK=8-milestone1
Oracle OpenJDK=8-milestone2
Oracle OpenJDK=8-milestone3
Oracle OpenJDK=8-milestone4
Oracle OpenJDK=8-milestone5
Oracle OpenJDK=8-milestone6
Oracle OpenJDK=8-milestone7
Oracle OpenJDK=8-milestone8
Oracle OpenJDK=8-milestone9
Oracle OpenJDK=8-update101
Oracle OpenJDK=8-update102
Oracle OpenJDK=8-update11
Oracle OpenJDK=8-update111
Oracle OpenJDK=8-update112
Oracle OpenJDK=8-update121
Oracle OpenJDK=8-update131
Oracle OpenJDK=8-update141
Oracle OpenJDK=8-update151
Oracle OpenJDK=8-update152
Oracle OpenJDK=8-update161
Oracle OpenJDK=8-update162
Oracle OpenJDK=8-update171
Oracle OpenJDK=8-update172
Oracle OpenJDK=8-update181
Oracle OpenJDK=8-update191
Oracle OpenJDK=8-update192
Oracle OpenJDK=8-update20
Oracle OpenJDK=8-update201
Oracle OpenJDK=8-update202
Oracle OpenJDK=8-update211
Oracle OpenJDK=8-update212
Oracle OpenJDK=8-update221
Oracle OpenJDK=8-update222
Oracle OpenJDK=8-update231
Oracle OpenJDK=8-update232
Oracle OpenJDK=8-update241
Oracle OpenJDK=8-update242
Oracle OpenJDK=8-update25
Oracle OpenJDK=8-update252
Oracle OpenJDK=8-update262
Oracle OpenJDK=8-update271
Oracle OpenJDK=8-update281
Oracle OpenJDK=8-update282
Oracle OpenJDK=8-update291
Oracle OpenJDK=8-update301
Oracle OpenJDK=8-update302
Oracle OpenJDK=8-update31
Oracle OpenJDK=8-update312
Oracle OpenJDK=8-update322
Oracle OpenJDK=8-update332
Oracle OpenJDK=8-update40
Oracle OpenJDK=8-update45
Oracle OpenJDK=8-update5
Oracle OpenJDK=8-update51
Oracle OpenJDK=8-update60
Oracle OpenJDK=8-update65
Oracle OpenJDK=8-update66
Oracle OpenJDK=8-update71
Oracle OpenJDK=8-update72
Oracle OpenJDK=8-update73
Oracle OpenJDK=8-update74
Oracle OpenJDK=8-update77
Oracle OpenJDK=8-update91
Oracle OpenJDK=8-update92
Oracle OpenJDK=18
Fedoraproject Fedora=35
Fedoraproject Fedora=36
NetApp 7-Mode Transition Tool
Netapp Active Iq Unified Manager Vmware Vsphere
Netapp Active Iq Unified Manager Windows
Netapp Cloud Insights Acquisition Unit
Netapp Cloud Secure Agent
Netapp Hci Management Node
NetApp OnCommand Insight
Netapp Solidfire
Netapp Hci Compute Node
Azul Zulu=6.47
Azul Zulu=7.54
Azul Zulu=8.62
Azul Zulu=11.56
Azul Zulu=13.48
Azul Zulu=15.40
Azul Zulu=17.34
Azul Zulu=18.30

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-34169?

    CVE-2022-34169 is a vulnerability in the Apache Xalan Java XSLT library that allows a remote attacker to execute arbitrary code on the system.

  • How does CVE-2022-34169 impact the Apache Xalan Java XSLT library?

    CVE-2022-34169 can be exploited by processing malicious XSLT stylesheets, leading to the corruption of Java class files and the execution of arbitrary Java bytecode.

  • What is the severity of CVE-2022-34169?

    CVE-2022-34169 has a severity rating of 7.5 (high).

  • What software versions are affected by CVE-2022-34169?

    The following software versions are affected by CVE-2022-34169: Apache Xalan Java XSLT library versions up to 2.7.2, OpenJDK 11 versions up to 11.0.17, OpenJDK 17 versions up to 17.0.5, and IBM Security Verify Governance versions up to 10.0.

  • How can I mitigate CVE-2022-34169?

    To mitigate CVE-2022-34169, users are recommended to update to Apache Xalan Java XSLT library version 2.7.3 or later. Additionally, update OpenJDK 11 to versions 11.0.18 or later, OpenJDK 17 to versions 17.0.6 or later, and IBM Security Verify Governance to version 10.0.1 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203