Apache Sling up to 1.0.11 XSS Protection API XSS.getValidXML Application xml external entity reference

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.7 | $0-$5k | 0.00 |
Summary
A vulnerability identified as critical has been detected in Apache Sling up to 1.0.11. Affected by this vulnerability is the function XSS.getValidXML of the component XSS Protection API. The manipulation as part of Application leads to xml external entity reference.
This vulnerability is listed as CVE-2016-6798. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
Details
A vulnerability, which was classified as critical, has been found in Apache Sling up to 1.0.11. This issue affects the function XSS.getValidXML of the component XSS Protection API. The manipulation as part of a Application leads to a xml external entity reference vulnerability. Using CWE to declare the problem leads to CWE-611. The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
The bug was discovered 07/18/2017. The weakness was presented 07/19/2017 (Website). It is possible to read the advisory at securityfocus.com. The identification of this vulnerability is CVE-2016-6798 since 08/12/2016. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details of the vulnerability are known, but there is no available exploit.
The vulnerability was handled as a non-public zero-day exploit for at least 1 days. During that time the estimated underground price was around $5k-$25k.
Upgrading to version 1.0.12 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 99873†). See VDB-103762 for similar entry. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.apache.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.0VulDB Meta Temp Score: 7.9
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Xml external entity referenceCWE: CWE-611 / CWE-610
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Sling 1.0.12
Timeline
08/12/2016 🔍07/18/2017 🔍
07/18/2017 🔍
07/19/2017 🔍
07/19/2017 🔍
07/19/2017 🔍
01/01/2021 🔍
Sources
Vendor: apache.orgAdvisory: securityfocus.com⛔
Researcher: Bertrand Delacretaz
Status: Not defined
CVE: CVE-2016-6798 (🔍)
GCVE (CVE): GCVE-0-2016-6798
GCVE (VulDB): GCVE-100-103763
SecurityFocus: 99873 - Apache Sling XSS Protection API CVE-2016-6798 XML External Entity Injection Vulnerability
See also: 🔍
Entry
Created: 07/19/2017 23:10Updated: 01/01/2021 19:36
Changes: 07/19/2017 23:10 (64), 10/27/2019 09:23 (3), 01/01/2021 19:36 (3)
Complete: 🔍
Cache ID: 216:818:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.