CVE-2022-41852 – commons-jxpath:commons-jxpath
Package
Manager: maven
Name: commons-jxpath:commons-jxpath
Vulnerable Version: <0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Withdrawn: CVE Rejected: JXPath vulnerable to remote code execution when interpreting untrusted XPath expressions ## This advisory has been withdrawn due to the CVE being rejected. ## Original advisory text Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except `compile()` and `compilePath()` function. The XPath expression can be used by an attacker to load any Java class from the classpath resulting in code execution.
Metadata
Created: 2022-10-06T18:52:05Z
Modified: 2023-03-06T22:41:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-wrx5-rp7m-mm49/GHSA-wrx5-rp7m-mm49.json
CWE IDs: ["CWE-470"]
Alternative ID: GHSA-wrx5-rp7m-mm49
Finding: N/A
Auto approve: 0