CVE-2022-25312: An XML external entity (XXE) injection vulnerability exists in the Apache Any23 RDFa XSLTStylesheet extractor

2022-03-04 Thread lewis john mcgibbney
Description:

An XML external entity (XXE) injection vulnerability was discovered in
the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23
versions < 2.7. XML external entity injection (also known as XXE) is a
web security vulnerability that allows an attacker to interfere with
an application's processing of XML data. It often allows an attacker
to view files on the application server filesystem, and to interact
with any back-end or external systems that the application itself can
access.

Resolution:

This issue is fixed in Apache Any23 2.7 which can be downloaded from
https://any23.apache.org/download.html. We strongly encourage all
Any23 users to upgrade to Apache Any23 2.7.

Credit:

The Apache Any23 Project Management Committee would like to thank Lion
Tree a.k.a liontree0110 for reporting this issue.

-- 
http://home.apache.org/~lewismc/
http://people.apache.org/keys/committer/lewismc


[ANNOUNCE] Apache Any23 2.7

2022-03-04 Thread lewis john mcgibbney
The Apache Any23 Project Management Committee is pleased to announce
the release of Apache Any23 2.7.

Apache Anything To Triples (Any23) is a library, a web service and a
command line tool that extracts structured data in RDF format from a
variety of Web documents.

Any23 2.7 requires JDK11 to build and run.

Release Notes: https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md

Download: http://any23.apache.org/download.html

Maven Artifacts:
https://search.maven.org/search?q=g:org.apache.any23%20AND%20v:2.7

DOAP: https://github.com/apache/any23-committers/blob/master/doap_Any23.rdf

Have Fun,
(Lewis), on behalf of the Apache Any23 PMC
N.B. The release artifacts can take a bit of time to reach the
distribution servers, please be patient.



-- 
http://home.apache.org/~lewismc/
http://people.apache.org/keys/committer/lewismc