The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURESECUREPROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.7.1-9", "binary_name": "libxalan2-java" }, { "binary_version": "2.7.1-9", "binary_name": "libxalan2-java-doc" }, { "binary_version": "2.7.1-9", "binary_name": "libxsltc-java" } ] }