First published: Fri Dec 30 2011(Updated: )
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/resteasy | <0:1.2.1-10.CP02_patch01.1.ep5.el5 | 0:1.2.1-10.CP02_patch01.1.ep5.el5 |
redhat/resteasy | <0:1.2.1-10.CP02_patch01.1.ep5.el6 | 0:1.2.1-10.CP02_patch01.1.ep5.el6 |
redhat/resteasy | <0:1.2.1-10.CP02_patch01.1.ep5.el4 | 0:1.2.1-10.CP02_patch01.1.ep5.el4 |
redhat/otopi | <0:1.1.0-1.el6e | 0:1.1.0-1.el6e |
redhat/ovirt-host-deploy | <0:1.1.0-1.el6e | 0:1.1.0-1.el6e |
redhat/python-daemon | <0:1.5.2-1.el6 | 0:1.5.2-1.el6 |
redhat/python-kitchen | <0:1.1.1-2.el6e | 0:1.1.1-2.el6e |
redhat/python-lockfile | <0:0.8-5.el6 | 0:0.8-5.el6 |
redhat/python-ply | <0:3.3-7.el6e | 0:3.3-7.el6e |
redhat/redhat-access-plugin-storage | <0:2.1.0-0.el6 | 0:2.1.0-0.el6 |
redhat/rhsc-cli | <0:2.1.0.0-0.bb3a.el6 | 0:2.1.0.0-0.bb3a.el6 |
redhat/rhsc-log-collector | <0:2.1-0.1.el6 | 0:2.1-0.1.el6 |
redhat/rhsc-sdk | <0:2.1.0.0-0.bb3a.el6 | 0:2.1.0.0-0.bb3a.el6 |
Redhat Resteasy | <=2.3.0 | |
Redhat Resteasy | =1.0.0 | |
Redhat Resteasy | =1.0.1 | |
Redhat Resteasy | =1.0.2 | |
Redhat Resteasy | =1.1 | |
Redhat Resteasy | =1.2 | |
Redhat Resteasy | =2.0.0 | |
Redhat Resteasy | =2.0.1 | |
Redhat Resteasy | =2.1.0 | |
Redhat Resteasy | =2.2.0 | |
Redhat Resteasy | =2.2.1 | |
Redhat Resteasy | =2.2.2 | |
Redhat Resteasy | =2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)