GHSA-wrx5-rp7m-mm49

Suggest an improvement
Source
https://github.com/advisories/GHSA-wrx5-rp7m-mm49
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-wrx5-rp7m-mm49/GHSA-wrx5-rp7m-mm49.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wrx5-rp7m-mm49
Withdrawn
2023-03-06T22:41:22Z
Published
2022-10-06T18:52:05Z
Modified
2024-02-21T05:22:46.201847Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Withdrawn: CVE Rejected: JXPath vulnerable to remote code execution when interpreting untrusted XPath expressions
Details

This advisory has been withdrawn due to the CVE being rejected.

Original advisory text

Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except compile() and compilePath() function. The XPath expression can be used by an attacker to load any Java class from the classpath resulting in code execution.

Database specific
{
    "nvd_published_at": "2022-10-06T18:17:00Z",
    "cwe_ids": [
        "CWE-470"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2022-10-06T20:35:33Z"
}
References

Affected packages

Maven / commons-jxpath:commons-jxpath

Package

Name
commons-jxpath:commons-jxpath
View open source insights on deps.dev
Purl
pkg:maven/commons-jxpath/commons-jxpath

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.3

Affected versions

1.*

1.0
1.1
1.2
1.3