CVE-2022-34169 (CNNVD-202207-1617)

HIGH
中文标题:
Apache Xalan 输入验证错误漏洞
英文标题:
Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets
CVSS分数: 7.5
发布时间: 2022-07-19 00:00:00
漏洞类型: 输入验证错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Apache Xalan是美国阿帕奇(Apache)基金会的开源软件库。 Apache Xalan Java XSLT库存在输入验证错误漏洞,该漏洞源于在处理恶意的XSLT样式表时,存在整数截断问题。这可以用来破坏由内部XSLTC编译器生成的Java类文件并执行任意的Java字节码。

英文描述:

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

CWE类型:
CWE-681
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Apache Software Foundation Apache Xalan-J - ≤ 2.7.2 - cpe:2.3:a:apache_software_foundation:apache_xalan-j:*:*:*:*:*:*:*:*
apache xalan-java * - - cpe:2.3:a:apache:xalan-java:*:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
debian debian_linux 11.0 - - cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
oracle graalvm 20.3.6 - - cpe:2.3:a:oracle:graalvm:20.3.6:*:*:*:enterprise:*:*:*
oracle graalvm 21.3.2 - - cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*
oracle graalvm 22.1.0 - - cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*
oracle jdk 1.7.0 - - cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*
oracle jdk 1.8.0 - - cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*
oracle jdk 11.0.15.1 - - cpe:2.3:a:oracle:jdk:11.0.15.1:*:*:*:*:*:*:*
oracle jdk 17.0.3.1 - - cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*
oracle jdk 18.0.1.1 - - cpe:2.3:a:oracle:jdk:18.0.1.1:*:*:*:*:*:*:*
oracle jre 1.7.0 - - cpe:2.3:a:oracle:jre:1.7.0:update343:*:*:*:*:*:*
oracle jre 1.8.0 - - cpe:2.3:a:oracle:jre:1.8.0:update333:*:*:*:*:*:*
oracle jre 11.0.15.1 - - cpe:2.3:a:oracle:jre:11.0.15.1:*:*:*:*:*:*:*
oracle jre 17.0.3.1 - - cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*
oracle jre 18.0.1.1 - - cpe:2.3:a:oracle:jre:18.0.1.1:*:*:*:*:*:*:*
oracle openjdk * - - cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
oracle openjdk 7 - - cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
oracle openjdk 8 - - cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
oracle openjdk 18 - - cpe:2.3:a:oracle:openjdk:18:*:*:*:*:*:*:*
fedoraproject fedora 35 - - cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
fedoraproject fedora 36 - - cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
netapp 7-mode_transition_tool - - - cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
netapp active_iq_unified_manager - - - cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
netapp cloud_insights_acquisition_unit - - - cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
netapp cloud_secure_agent - - - cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
netapp hci_management_node - - - cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
netapp oncommand_insight - - - cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
netapp solidfire - - - cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
netapp hci_compute_node - - - cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
azul zulu 6.47 - - cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*
azul zulu 7.54 - - cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*
azul zulu 8.62 - - cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*
azul zulu 11.56 - - cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*
azul zulu 13.48 - - cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*
azul zulu 15.40 - - cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*
azul zulu 17.34 - - cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*
azul zulu 18.30 - - cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
[oss-security] 20220719 CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets mailing-list
cve.org
访问
无标题 OTHER
cve.org
访问
[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets mailing-list
cve.org
访问
[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets mailing-list
cve.org
访问
[oss-security] 20220720 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets mailing-list
cve.org
访问
DSA-5188 vendor-advisory
cve.org
访问
DSA-5192 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
FEDORA-2022-19b6f21746 vendor-advisory
cve.org
访问
FEDORA-2022-ae563934f7 vendor-advisory
cve.org
访问
FEDORA-2022-e573851f56 vendor-advisory
cve.org
访问
FEDORA-2022-d26586b419 vendor-advisory
cve.org
访问
FEDORA-2022-80afe2304a vendor-advisory
cve.org
访问
FEDORA-2022-b76ab52e73 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
[oss-security] 20221017 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets mailing-list
cve.org
访问
[debian-lts-announce] 20221018 [SECURITY] [DLA 3155-1] bcel security update mailing-list
cve.org
访问
DSA-5256 vendor-advisory
cve.org
访问
[oss-security] 20221104 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing mailing-list
cve.org
访问
[oss-security] 20221107 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing mailing-list
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS版本: 3.1
机密性
NONE
完整性
HIGH
可用性
NONE
时间信息
发布时间:
2022-07-19 00:00:00
修改时间:
2025-02-13 16:32:44
创建时间:
2025-11-11 15:37:36
更新时间:
2025-11-11 15:57:23
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2022-34169 2025-11-11 15:21:29 2025-11-11 07:37:36
NVD nvd_CVE-2022-34169 2025-11-11 14:58:21 2025-11-11 07:45:50
CNNVD cnnvd_CNNVD-202207-1617 2025-11-11 15:12:18 2025-11-11 07:57:23
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:57:23
vulnerability_type: 未提取 → 输入验证错误; cnnvd_id: 未提取 → CNNVD-202207-1617; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 输入验证错误
  • cnnvd_id: 未提取 -> CNNVD-202207-1617
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:50
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 1 → 39; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 1 -> 39
  • data_sources: ['cve'] -> ['cve', 'nvd']