Apache XML Graphics FOP 2.1 Information Disclosure

2017.04.19
Credit: Pierre Ernst
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-611


Ogólna skala CVSS: 7.9/10
Znaczenie: 9.2/10
Łatwość wykorzystania: 6.8/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Jednorazowa
Wpływ na poufność: Pełny
Wpływ na integralność: Brak
Wpływ na dostępność: Pełny

CVE-2017-5661: Apache XML Graphics FOP information disclosure vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: FOP 1.0 - 2.1 Description: Files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server--including confidential or sensitive files--would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack. Mitigation: Users should upgrade to FOP 2.2+ Credit: This issue was independently reported by Pierre Ernst at Salesforce. References: http://xmlgraphics.apache.org/security.html The Apache XML Graphics team.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top