First published: Mon Jan 30 2012(Updated: )
RESTEasy permits XXE (XML eXternal Entity) attacks. If a RESTEasy endpoint is deployed, a user can submit a request containing an external XML entity. This XML entity will be resolved, allowing a remote attacker to read files in the context of the user running the application server. This flaw affects DOM Document, JAXB and Fast Infoset (FI) input. Upstream bugs: <a href="https://issues.jboss.org/browse/RESTEASY-637">https://issues.jboss.org/browse/RESTEASY-637</a> <a href="https://issues.jboss.org/browse/RESTEASY-647">https://issues.jboss.org/browse/RESTEASY-647</a> <a href="https://issues.jboss.org/browse/RESTEASY-659">https://issues.jboss.org/browse/RESTEASY-659</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jboss.resteasy:resteasy-jaxb-provider | <2.3.2 | 2.3.2 |
Red Hat Resteasy Base JAX-RS API | <=2.3.1 | |
Red Hat Resteasy Base JAX-RS API | =1.0.0 | |
Red Hat Resteasy Base JAX-RS API | =1.0.1 | |
Red Hat Resteasy Base JAX-RS API | =1.0.2 | |
Red Hat Resteasy Base JAX-RS API | =1.1 | |
Red Hat Resteasy Base JAX-RS API | =1.2 | |
Red Hat Resteasy Base JAX-RS API | =2.0.0 | |
Red Hat Resteasy Base JAX-RS API | =2.0.1 | |
Red Hat Resteasy Base JAX-RS API | =2.1.0 | |
Red Hat Resteasy Base JAX-RS API | =2.2.0 | |
Red Hat Resteasy Base JAX-RS API | =2.2.1 | |
Red Hat Resteasy Base JAX-RS API | =2.2.2 | |
Red Hat Resteasy Base JAX-RS API | =2.2.3 | |
Red Hat Resteasy Base JAX-RS API | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5245 is classified as a critical vulnerability due to its potential for remote file access.
To fix CVE-2011-5245, upgrade the RESTEasy library to version 2.3.2 or later.
CVE-2011-5245 affects all versions of RESTEasy prior to 2.3.2, including versions 1.0.0 through 2.3.1.
CVE-2011-5245 permits XML eXternal Entity (XXE) attacks, which can lead to unauthorized file access.
It is highly discouraged to continue using affected versions of RESTEasy, as this could expose your application to critical risks.