We found results for “”
CVE-2014-0119
Good to know:
Date: May 31, 2014
Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.
Language: Java
Severity Score
Related Resources (56)
Severity Score
Weakness Type (CWE)
Permissions, Privileges, and Access Control
CWE-264Top Fix
Upgrade Version
Upgrade to version org.apache.tomcat:jasper:6.0.41,org.apache.tomcat:catalina:6.0.41,org.apache.tomcat:tomcat-jasper:8.0.8,7.0.54,org.apache.tomcat:tomcat-catalina:8.0.8,7.0.54,org.apache.tomcat:tomcat-util-scan:8.0.8,7.0.54,org.apache.tomcat.embed:tomcat-embed-core:8.0.8,7.0.54
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | MEDIUM |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |