Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.1.2-2ubuntu1.14.04.1", "binary_name": "libjakarta-taglibs-standard-java" }, { "binary_version": "1.1.2-2ubuntu1.14.04.1", "binary_name": "libjstl1.1-java" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.1.2-3ubuntu1", "binary_name": "libjakarta-taglibs-standard-java" }, { "binary_version": "1.1.2-3ubuntu1", "binary_name": "libjstl1.1-java" } ] }