You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 9, 2023. It is now read-only.
Felix Wilhelm from Google Project Zero reported CVE-2022-34169:
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected.
Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
No more specific details are being shared at this point, but OpenJDK was already patched and the relevant OpenJDK bugs/commits seem to be the following:
This is clearly a BCEL issue rather than strictly a Xalan one, however the Xalan distribution includes an old version of BCEL as well as other packages. The EchoXSL jar file does not ship BCEL packages (they are an external optional dependency instead) so in principle there is nothing to be done here, except perhaps upgrading BCEL when a new version appears (haven't checked whether the latest BCEL is vulnerable or not).
I'll keep this issue open as a reminder that the BCEL dependency should be checked for safety (and eventually a new version). Meanwhile, it is unclear what the Apache Xalan project is going to do regarding this vulnerability, as they were just discussing about retiring Xalan to the Attic.