ID CVE-2005-3757
Summary The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.
References
Vulnerable Configurations
  • cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*
    cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*
  • cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:*
    cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-10-2018 - 15:39)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 15509
bugtraq 20051121 Google Search Appliance proxystylesheet Flaws
misc http://metasploit.com/research/vulns/google_proxystylesheet/
osvdb 20981
sectrack 1015246
secunia 17644
vupen ADV-2005-2500
Last major update 19-10-2018 - 15:39
Published 22-11-2005 - 21:03
Last modified 19-10-2018 - 15:39
Back to Top