HTTP: Google proxystylesheet Arbitrary Command Execution

This signature detects attempts to exploit a known vulnerability against Google proxystylesheet. A successful attack can lead to arbitrary code execution.

Extended Description

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

Affected Products

Google mini_search_appliance

References

BugTraq: 15509

CVE: CVE-2005-3757

Short Name
HTTP:CTS:GOOGLE-PRXYSTYLSHET-CE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Arbitrary CVE-2005-3757 Command Execution Google bid:15509 proxystylesheet
Release Date
06/07/2021
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3390
False Positive
Unknown
Vendors

Google

Found a potential security threat?