CVE-2022-25312: An XML external entity (XXE) injection vulnerability exists in the Apache Any23 RDFa XSLTStylesheet extractor
Description: An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. Resolution: This issue is fixed in Apache Any23 2.7 which can be downloaded from https://any23.apache.org/download.html. We strongly encourage all Any23 users to upgrade to Apache Any23 2.7. Credit: The Apache Any23 Project Management Committee would like to thank Lion Tree a.k.a liontree0110 for reporting this issue. -- http://home.apache.org/~lewismc/ http://people.apache.org/keys/committer/lewismc
[ANNOUNCE] Apache Any23 2.7
The Apache Any23 Project Management Committee is pleased to announce the release of Apache Any23 2.7. Apache Anything To Triples (Any23) is a library, a web service and a command line tool that extracts structured data in RDF format from a variety of Web documents. Any23 2.7 requires JDK11 to build and run. Release Notes: https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md Download: http://any23.apache.org/download.html Maven Artifacts: https://search.maven.org/search?q=g:org.apache.any23%20AND%20v:2.7 DOAP: https://github.com/apache/any23-committers/blob/master/doap_Any23.rdf Have Fun, (Lewis), on behalf of the Apache Any23 PMC N.B. The release artifacts can take a bit of time to reach the distribution servers, please be patient. -- http://home.apache.org/~lewismc/ http://people.apache.org/keys/committer/lewismc