PHP : XSLT injection
Classification
Overview
The application uses data from an untrusted source when using XSL. This allows an attacker to modify the structure and contents of the XSL stylesheet file and, indirectly, the corresponding XML file.
Applications use XSL to transform XML documents. XSL stylesheet files contain special functions that describe the transformation and, if incorrectly implemented, may contain vulnerabilities.
If an attacker is able to add XSL elements, the semantics of the corresponding XML document may change. In particular, XSS attacks, gaining access to system resources and executing arbitrary Java code are possible. If an attacker has full control over the contents of the stylesheet file, he/she may also organize the XXE attack (XML eXternal Entity - injection of external entities into XML).
