Navigation Menu

Skip to content

Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets

High severity GitHub Reviewed Published Jul 20, 2022 to the GitHub Advisory Database • Updated Jan 19, 2024

Package

maven xalan:xalan (Maven)

Affected versions

< 2.7.3

Patched versions

2.7.3

Description

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.

References

Published by the National Vulnerability Database Jul 19, 2022
Published to the GitHub Advisory Database Jul 20, 2022
Reviewed Jul 21, 2022
Last updated Jan 19, 2024

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2022-34169

GHSA ID

GHSA-9339-86wc-4qgf

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.