Your submission was sent successfully! Close

CVE-2014-0096

Published: 31 May 2014

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

From the Ubuntu security team

It was discovered that Tomcat did not properly restrict XSLT stylesheets. An attacker could use this issue with a crafted web application to bypass security-manager restrictions and read arbitrary files.

Priority

Medium

Status

Package Release Status
tomcat6
Launchpad, Ubuntu, Debian
Upstream
Released (6.0.41-1)
Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(6.0.41-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (6.0.39-1ubuntu0.1)
Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1585853
tomcat7
Launchpad, Ubuntu, Debian
Upstream
Released (7.0.53-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(7.0.53-1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(7.0.53-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (7.0.52-1ubuntu0.1)
Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1578637
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1578655
tomcat8
Launchpad, Ubuntu, Debian
Upstream
Released (8.0.5-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(8.0.9-1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(8.0.9-1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist