We found results for “


Good to know:


Date: May 31, 2014

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Permissions, Privileges, and Access Control


Top Fix


Upgrade Version

Upgrade to version org.apache.tomcat:jasper:6.0.41,org.apache.tomcat:catalina:6.0.41,org.apache.tomcat:tomcat-jasper:8.0.8,7.0.54,org.apache.tomcat:tomcat-catalina:8.0.8,7.0.54,org.apache.tomcat:tomcat-util-scan:8.0.8,7.0.54,org.apache.tomcat.embed:tomcat-embed-core:8.0.8,7.0.54

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV):
Attack Complexity (AC):
Privilegs Required (PR):
User Interaction (UI):
Scope (S):
Confidentiality (C):
Integrity (I):
Availability (A):


Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): MEDIUM
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): NONE
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us