First published: Wed Jun 11 2014(Updated: )
IssueDescription: It was found that the fix for <a href="https://access.redhat.com/security/cve/CVE-2012-0818">CVE-2012-0818</a> was incomplete: external parameter entities were not disabled when the resteasy.document.expand.entity.references parameter was set to false. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/resteasy | <3.0.9. | 3.0.9. |
redhat/resteasy | <2.3.8. | 2.3.8. |
redhat/resteasy 2.3.8.SP1-redhat | <1 | 1 |
JBoss Enterprise Application Platform | =6.3.0 | |
Red Hat Resteasy Base JAX-RS API | >=2.3.1<=2.3.7.2 | |
Red Hat Resteasy Base JAX-RS API | >=3.0.0<3.0.9 | |
Red Hat Resteasy Base JAX-RS API | =3.0-beta1 | |
Red Hat Resteasy Base JAX-RS API | =3.0-beta2 | |
Red Hat Resteasy Base JAX-RS API | =3.0-beta3 | |
Red Hat Resteasy Base JAX-RS API | =3.0-beta4 | |
Red Hat Resteasy Base JAX-RS API | =3.0-beta5 | |
Red Hat Resteasy Base JAX-RS API | =3.0-beta6 | |
Red Hat Resteasy Base JAX-RS API | =3.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3490 has been classified as a moderate severity vulnerability.
To fix CVE-2014-3490, upgrade to a fixed version of RESTEasy or apply relevant security patches from Red Hat.
CVE-2014-3490 affects certain versions of RESTEasy, specifically versions prior to 2.3.8, 3.0.9, and affected betas.
CVE-2014-3490 is an XML External Entity (XXE) vulnerability.
Yes, CVE-2014-3490 can be exploited remotely by an attacker who can send crafted XML requests.