Home / Vulnerability Database / PHP : XSLT injection
PHP

PHP : XSLT injection

Overview

The application uses data from an untrusted source when using XSL. This allows an attacker to modify the structure and contents of the XSL stylesheet file and, indirectly, the corresponding XML file.

Applications use XSL to transform XML documents. XSL stylesheet files contain special functions that describe the transformation and, if incorrectly implemented, may contain vulnerabilities.

If an attacker is able to add XSL elements, the semantics of the corresponding XML document may change. In particular, XSS attacks, gaining access to system resources and executing arbitrary Java code are possible. If an attacker has full control over the contents of the stylesheet file, he/she may also organize the XXE attack (XML eXternal Entity - injection of external entities into XML).

MEDIUM

DerScanner Severity Score

Do you want to fix PHP : XSLT injection in your application?

See also

PHP

PHP : Null salt

PHP

PHP : Empty password

PHP

PHP : Empty salt