First published: Mon Oct 13 2014(Updated: )
Apache POI is a library providing Java API for working with OOXML document<br>files.<br>It was found that Apache POI would resolve entities in OOXML documents.<br>A remote attacker able to supply OOXML documents that are parsed by Apache<br>POI could use this flaw to read files accessible to the user running the<br>application server, and potentially perform more advanced XML External<br>Entity (XXE) attacks. (CVE-2014-3529)<br>It was found that Apache POI would expand an unlimited number of entities<br>in OOXML documents. A remote attacker able to supply OOXML documents that<br>are parsed by Apache POI could use this flaw to trigger a denial of service<br>attack via excessive CPU and memory consumption. (CVE-2014-3574)<br>All users of Red Hat JBoss BPM Suite 6.0.3 as provided from the Red Hat<br>Customer Portal are advised to apply this security update.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache POI | ||
Red Hat JBoss BPM Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:1399 is classified as moderate.
To fix RHSA-2014:1399, update the Apache POI and Red Hat JBoss BPM Suite to their latest patched versions.
The vulnerability in RHSA-2014:1399 is caused by Apache POI resolving entities in OOXML documents, allowing remote file reading by attackers.
Affected software includes Apache POI and Red Hat JBoss BPM Suite.
Yes, RHSA-2014:1399 can lead to data breaches as it allows unauthorized access to files through vulnerable OOXML document processing.