First published: Mon Jan 30 2012(Updated: )
RESTEasy permits XXE (XML eXternal Entity) attacks. If a RESTEasy endpoint is deployed, a user can submit a request containing an external XML entity. This XML entity will be resolved, allowing a remote attacker to read files in the context of the user running the application server. This flaw affects DOM Document, JAXB and Fast Infoset (FI) input. Upstream bugs: <a href="https://issues.jboss.org/browse/RESTEASY-637">https://issues.jboss.org/browse/RESTEASY-637</a> <a href="https://issues.jboss.org/browse/RESTEASY-647">https://issues.jboss.org/browse/RESTEASY-647</a> <a href="https://issues.jboss.org/browse/RESTEASY-659">https://issues.jboss.org/browse/RESTEASY-659</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Resteasy | =2.1.0 | |
Redhat Resteasy | =2.2.0 | |
Redhat Resteasy | =2.0.0 | |
Redhat Resteasy | =1.2 | |
Redhat Resteasy | =1.1 | |
Redhat Resteasy | =2.2.2 | |
Redhat Resteasy | =1.0.2 | |
Redhat Resteasy | =1.0.1 | |
Redhat Resteasy | =1.0.0 | |
Redhat Resteasy | =2.2.3 | |
Redhat Resteasy | =2.0.1 | |
Redhat Resteasy | =2.2.1 | |
Redhat Resteasy | <=2.3.1 | |
Redhat Resteasy | =2.3.0 | |
maven/org.jboss.resteasy:resteasy-jaxb-provider | <2.3.2 | 2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.