CVE-2023-26119: HtmlUnit Code Injection vulnerability
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88285%
CWE
Published
7/6/2023
Updated
12/7/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| net.sourceforge.htmlunit:htmlunit | maven | < 3.0.0 | 3.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XSLT processing where the TransformerFactory wasn't configured with FEATURE_SECURE_PROCESSING. This allowed execution of Java extension functions through XSLT stylesheets. The commit explicitly adds transformerFactory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true) to mitigate this. The PoC demonstrates exploiting this by calling Runtime.getRuntime() through Xalan extensions, which would be blocked when secure processing is enabled.