4.3
CVSSv2

CVE-2014-0119

Published: 31/05/2014 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apache Tomcat prior to 6.0.40, 7.x prior to 7.0.54, and 8.x prior to 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote malicious users to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 8.0.5

apache tomcat 8.0.1

apache tomcat 8.0.0

apache tomcat 8.0.3

apache tomcat 6.0.33

apache tomcat 6.0.0

apache tomcat 6.0.6

apache tomcat 6.0.4

apache tomcat 6.0.11

apache tomcat

apache tomcat 6

apache tomcat 6.0.7

apache tomcat 6.0.15

apache tomcat 6.0.20

apache tomcat 6.0.9

apache tomcat 6.0.10

apache tomcat 6.0.31

apache tomcat 6.0.29

apache tomcat 6.0.3

apache tomcat 6.0.1

apache tomcat 6.0.24

apache tomcat 6.0.37

apache tomcat 6.0.17

apache tomcat 6.0

apache tomcat 6.0.32

apache tomcat 6.0.28

apache tomcat 6.0.14

apache tomcat 6.0.12

apache tomcat 6.0.18

apache tomcat 6.0.2

apache tomcat 6.0.5

apache tomcat 6.0.30

apache tomcat 6.0.13

apache tomcat 6.0.8

apache tomcat 6.0.26

apache tomcat 6.0.19

apache tomcat 6.0.27

apache tomcat 6.0.35

apache tomcat 6.0.16

apache tomcat 6.0.36

apache tomcat 7.0.2

apache tomcat 7.0.49

apache tomcat 7.0.12

apache tomcat 7.0.53

apache tomcat 7.0.20

apache tomcat 7.0.34

apache tomcat 7.0.8

apache tomcat 7.0.1

apache tomcat 7.0.5

apache tomcat 7.0.4

apache tomcat 7.0.22

apache tomcat 7.0.39

apache tomcat 7.0.26

apache tomcat 7.0.46

apache tomcat 7.0.28

apache tomcat 7.0.0

apache tomcat 7.0.50

apache tomcat 7.0.6

apache tomcat 7.0.18

apache tomcat 7.0.14

apache tomcat 7.0.48

apache tomcat 7.0.11

apache tomcat 7.0.23

apache tomcat 7.0.44

apache tomcat 7.0.7

apache tomcat 7.0.52

apache tomcat 7.0.42

apache tomcat 7.0.37

apache tomcat 7.0.29

apache tomcat 7.0.45

apache tomcat 7.0.13

apache tomcat 7.0.47

apache tomcat 7.0.41

apache tomcat 7.0.31

apache tomcat 7.0.30

apache tomcat 7.0.15

apache tomcat 7.0.19

apache tomcat 7.0.16

apache tomcat 7.0.10

apache tomcat 7.0.36

apache tomcat 7.0.25

apache tomcat 7.0.35

apache tomcat 7.0.43

apache tomcat 7.0.32

apache tomcat 7.0.38

apache tomcat 7.0.21

apache tomcat 7.0.27

apache tomcat 7.0.24

apache tomcat 7.0.17

apache tomcat 7.0.40

apache tomcat 7.0.9

apache tomcat 7.0.3

apache tomcat 7.0.33

Vendor Advisories

Several security issues were fixed in Tomcat ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections and bypass of the SecurityManager For the oldstable distribution (wheezy), these problems have been fixed in version 7028-4+deb7u4 This update also fixes CVE-2014-0119 and CVE-20 ...
It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by JBoss Web / Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files The injected XML parser(s) could then bypass the limits imposed on XML ...

References

CWE-264http://tomcat.apache.org/security-6.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1589992http://svn.apache.org/viewvc?view=revision&revision=1590028http://svn.apache.org/viewvc?view=revision&revision=1588199http://svn.apache.org/viewvc?view=revision&revision=1593815http://svn.apache.org/viewvc?view=revision&revision=1589997http://svn.apache.org/viewvc?view=revision&revision=1589985http://svn.apache.org/viewvc?view=revision&revision=1589990http://svn.apache.org/viewvc?view=revision&revision=1588193http://tomcat.apache.org/security-8.htmlhttp://tomcat.apache.org/security-7.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1589640http://svn.apache.org/viewvc?view=revision&revision=1589837http://svn.apache.org/viewvc?view=revision&revision=1589980http://svn.apache.org/viewvc?view=revision&revision=1590036http://svn.apache.org/viewvc?view=revision&revision=1589983http://svn.apache.org/viewvc?view=revision&revision=1593821http://secunia.com/advisories/59873http://www-01.ibm.com/support/docview.wss?uid=swg21678231http://www.securityfocus.com/bid/67669http://secunia.com/advisories/59732http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://www-01.ibm.com/support/docview.wss?uid=swg21681528http://secunia.com/advisories/60729http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlhttp://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://seclists.org/fulldisclosure/2014/Dec/23http://advisories.mageia.org/MGASA-2014-0268.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:052http://rhn.redhat.com/errata/RHSA-2015-0675.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:053http://rhn.redhat.com/errata/RHSA-2015-0720.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:084http://rhn.redhat.com/errata/RHSA-2015-0765.htmlhttp://www.debian.org/security/2016/dsa-3530http://www.debian.org/security/2016/dsa-3552http://marc.info/?l=bugtraq&m=141017844705317&w=2http://marc.info/?l=bugtraq&m=144498216801440&w=2http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013http://www.securitytracker.com/id/1030298http://seclists.org/fulldisclosure/2014/May/141http://www.ubuntu.com/usn/USN-2654-1http://www.securityfocus.com/archive/1/534161/100/0/threadedhttps://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3Ehttps://usn.ubuntu.com/2654-1/https://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2014-0119