Withdrawn: CVE Rejected: JXPath vulnerable to remote code execution when interpreting untrusted XPath expressions
Critical severity
GitHub Reviewed
Published
Oct 6, 2022
to the GitHub Advisory Database
•
Updated Mar 6, 2023
Withdrawn
This advisory was withdrawn on Mar 6, 2023
Description
Published by the National Vulnerability Database
Oct 6, 2022
Published to the GitHub Advisory Database
Oct 6, 2022
Reviewed
Oct 6, 2022
Withdrawn
Mar 6, 2023
Last updated
Mar 6, 2023
This advisory has been withdrawn due to the CVE being rejected.
Original advisory text
Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except
compile()
andcompilePath()
function. The XPath expression can be used by an attacker to load any Java class from the classpath resulting in code execution.References