Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.sling/org.apache.sling.xss
  4. ›
  5. CVE-2016-6798

CVE-2016-6798: Improper Restriction of XML External Entity Reference

July 19, 2017 (updated July 25, 2017)

In the XSS Protection API module in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.

References

  • www.securityfocus.com/bid/99873
  • nvd.nist.gov/vuln/detail/CVE-2016-6798

Code Behaviors & Features

Detect and mitigate CVE-2016-6798 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.0.10

Fixed versions

  • 2.0

Solution

Upgrade to version 2.0 or above.

Impact 9.8 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-611: Improper Restriction of XML External Entity Reference

Source file

maven/org.apache.sling/org.apache.sling.xss/CVE-2016-6798.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:45 +0000.