Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13cng1LXJwN20tbW00Oc4AAvLU
Withdrawn: CVE Rejected: JXPath vulnerable to remote code execution when interpreting untrusted XPath expressions
This advisory has been withdrawn due to the CVE being rejected.
Original advisory text
Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except compile()
and compilePath()
function. The XPath expression can be used by an attacker to load any Java class from the classpath resulting in code execution.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13cng1LXJwN20tbW00Oc4AAvLU
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 2 years ago
Updated: almost 2 years ago Widthdrawn: almost 2 years ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-wrx5-rp7m-mm49, CVE-2022-41852
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-41852
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47133
- https://commons.apache.org/proper/commons-jxpath/users-guide.html#Standard_Extension_Functions
- https://hackinglab.cz/en/blog/remote-code-execution-in-jxpath-library-cve-2022-41852/
- https://github.com/advisories/GHSA-wrx5-rp7m-mm49
Affected Packages
maven:commons-jxpath:commons-jxpath
Dependent packages: 232Dependent repositories: 2,283
Downloads:
Affected Version Ranges: <= 1.3
No known fixed version
All affected versions: