First published: Tue Nov 18 2014(Updated: )
DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/resteasy | <3.0.11. | 3.0.11. |
redhat/resteasy | <2.3.10. | 2.3.10. |
Red Hat Resteasy Base JAX-RS API | =2.3.7 | |
Red Hat Resteasy Base JAX-RS API | =3.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7839 is classified as a medium severity vulnerability due to its potential exploitation through XML external entity (XXE) attacks.
To fix CVE-2014-7839, upgrade to RESTEasy versions 3.0.11 or 2.3.10, which implement the necessary security configurations.
CVE-2014-7839 affects RESTEasy versions 2.3.7 and 3.0.9.
CVE-2014-7839 allows remote attackers to conduct XML external entity (XXE) attacks.
Any user or organization using vulnerable versions of RESTEasy could be affected by CVE-2014-7839.