First published: Wed Jun 25 2014(Updated: )
It was found that the org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory() method implementation provided a DocumentBuilderFactory that will expand entity references. This could be used by a remote, unauthenticated attacker to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | =5.2.0 | |
Red Hat JBoss Enterprise Application Platform | =6.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3530 is classified as a moderate severity vulnerability that can allow unauthorized file access.
To fix CVE-2014-3530, upgrade to Red Hat JBoss Enterprise Application Platform version 5.2.1 or later, or 6.2.5 or later.
CVE-2014-3530 affects users of Red Hat JBoss Enterprise Application Platform versions 5.2.0 and 6.2.4.
CVE-2014-3530 can be exploited by a remote, unauthenticated attacker to read sensitive files on the server.
The vulnerability in CVE-2014-3530 arises from improper handling of XML entity references in the document parsing functionality.