Miggo Logo

CVE-2023-49093: HtmlUnit vulnerable to Remote Code Execution (RCE) via XSTL

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.89388%
Published
12/4/2023
Updated
12/4/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.htmlunit:htmlunitmaven< 3.9.03.9.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerable function is identified based on the description of the vulnerability and its location in the HtmlUnit codebase. The transform method in XSLProcessor is directly implicated in the vulnerability due to its role in processing XSL transformations without secure processing features enabled.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *tmlUnit *.*.* *r* vuln*r**l* to R*mot* *o** *x**ution (R**) vi* XSTL, w**n *rowsin* t** *tt**k*r’s w**p*** ### **t*ils Vuln*r**ility *o** lo**tion: or*.*tmlunit.**tiv*x.j*v*s*ript.msxml.XSLPro**ssor#tr*ns*orm(or*.*tmlunit.**tiv*x.j*v*s*

Reasoning

T** vuln*r**l* `*un*tion` is i**nti*i** **s** on t** **s*ription o* t** vuln*r**ility *n* its lo**tion in t** `*tmlUnit` *o****s*. T** `tr*ns*orm` m*t*o* in `XSLPro**ssor` is *ir**tly impli**t** in t** vuln*r**ility *u* to its rol* in pro**ssin* XSL