Skip to content
This repository was archived by the owner on Apr 9, 2023. It is now read-only.
This repository was archived by the owner on Apr 9, 2023. It is now read-only.

CVE-2022-34169 XSLTC bytecode corruption vulnerability #2

@carlosame

Description

@carlosame

Felix Wilhelm from Google Project Zero reported CVE-2022-34169:

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected.

Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

No more specific details are being shared at this point, but OpenJDK was already patched and the relevant OpenJDK bugs/commits seem to be the following:

Bug Commit
8285407 openjdk/jdk@41ef2b2
8287916 openjdk/jdk@7b418f9

Analysis

This is clearly a BCEL issue rather than strictly a Xalan one, however the Xalan distribution includes an old version of BCEL as well as other packages. The EchoXSL jar file does not ship BCEL packages (they are an external optional dependency instead) so in principle there is nothing to be done here, except perhaps upgrading BCEL when a new version appears (haven't checked whether the latest BCEL is vulnerable or not).

I'll keep this issue open as a reminder that the BCEL dependency should be checked for safety (and eventually a new version). Meanwhile, it is unclear what the Apache Xalan project is going to do regarding this vulnerability, as they were just discussing about retiring Xalan to the Attic.

Metadata

Metadata

Assignees

No one assigned

    Labels

    securitySecurity and privacy

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions