CVE-2024-31573: XMLUnit for Java has Insecure Defaults when Processing XSLT Stylesheets
When performing XSLT transformations XMLUnit for Java did not disable XSLT extension functions by default. Depending on the XSLT processor being used this could allow arbitrary code to be executed when XMLUnit is used to transform data with a stylesheet who’s source can not be trusted. If the stylesheet can be provided externally this may even lead to a remote code execution.
References
- docs.oracle.com/en/java/javase/22/security/java-api-xml-processing-jaxp-security-guide.html
- github.com/advisories/GHSA-chfm-68vv-pvw5
- github.com/xmlunit/xmlunit
- github.com/xmlunit/xmlunit/commit/b81d48b71dfd2868bdfc30a3e17ff973f32bc15b
- github.com/xmlunit/xmlunit/issues/264
- github.com/xmlunit/xmlunit/security/advisories/GHSA-chfm-68vv-pvw5
- nvd.nist.gov/vuln/detail/CVE-2024-31573
Detect and mitigate CVE-2024-31573 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →