Vigil@nce - Vigil@nce - WebSphere AS: external XML entity injection via Java Batch, analyzed on 26/05/2021
July 2021 by Vigil@nce
Vigil@nce - An attacker can transmit malicious XML data via Java Batch to WebSphere AS, in order to read a file, scan sites, or trigger a denial of service.
Plus d'information sur : https://vigilance.fr/vulnerability/WebSphere-AS-external-XML-entity-injection-via-Java-Batch-35533