First published: Wed Jun 11 2014(Updated: )
IssueDescription: It was found that the fix for <a href="https://access.redhat.com/security/cve/CVE-2012-0818">CVE-2012-0818</a> was incomplete: external parameter entities were not disabled when the resteasy.document.expand.entity.references parameter was set to false. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Enterprise Application Platform | =6.3.0 | |
Redhat Resteasy | >=2.3.1<=2.3.7.2 | |
Redhat Resteasy | >=3.0.0<3.0.9 | |
Redhat Resteasy | =3.0-beta1 | |
Redhat Resteasy | =3.0-beta2 | |
Redhat Resteasy | =3.0-beta3 | |
Redhat Resteasy | =3.0-beta4 | |
Redhat Resteasy | =3.0-beta5 | |
Redhat Resteasy | =3.0-beta6 | |
Redhat Resteasy | =3.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.