Joined: 12 May 2004
|Posted: Sat Apr 02, 2016 8:26 pm Post subject: [ GLSA 201604-02 ] Xalan-Java
|Gentoo Linux Security Advisory
Title: Xalan-Java: Arbitrary code execution (GLSA 201604-02)
Date: April 02, 2016
Insufficient constraints in Apache's Xalan-Java might allow remote
attackers to execute arbitrary code and load arbitrary classes.
Xalan-Java is an XSLT processor for transforming XML documents into
HTML, text, or other XML document types.
Vulnerable: < 2.7.2
Unaffected: >= 2.7.2
Architectures: All supported architectures
The TransformerFactory in Apache Xalan-Java does not properly restrict
access to certain properties when FEATURE_SECURE_PROCESSING is enabled.
This can also be exploited via a Java property that is bound to the XSLT
1.0 system-property function.
A remote attacker could inject specially crafted XSLT properties
resulting in the execution of arbitrary code with the privileges of the
There is no known work around at this time.
All Xalan-Java users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/xalan-2.7.2"