The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.
Link | Tags |
---|---|
http://secunia.com/advisories/17644 | third party advisory vendor advisory |
http://metasploit.com/research/vulns/google_proxystylesheet/ | exploit patch vendor advisory |
http://www.securityfocus.com/archive/1/417310/30/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2005/2500 | vdb entry |
http://www.securityfocus.com/bid/15509 | exploit vdb entry patch |
http://securitytracker.com/id?1015246 | exploit vdb entry patch vendor advisory |
http://www.osvdb.org/20981 | exploit vdb entry patch |