First published: Mon Oct 13 2014(Updated: )
Apache POI is a library providing Java API for working with OOXML document<br>files.<br>It was found that Apache POI would resolve entities in OOXML documents.<br>A remote attacker able to supply OOXML documents that are parsed by Apache<br>POI could use this flaw to read files accessible to the user running the<br>application server, and potentially perform more advanced XML External<br>Entity (XXE) attacks. (CVE-2014-3529)<br>It was found that Apache POI would expand an unlimited number of entities<br>in OOXML documents. A remote attacker able to supply OOXML documents that<br>are parsed by Apache POI could use this flaw to trigger a denial of service<br>attack via excessive CPU and memory consumption. (CVE-2014-3574)<br>All users of Red Hat JBoss BRMS 6.0.3 as provided from the Red Hat<br>Customer Portal are advised to apply this security update.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache POI | ||
Red Hat JBoss Enterprise BRMS Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:1400 is classified as moderate.
To fix RHSA-2014:1400, apply the patches provided in the security advisory related to this vulnerability.
Exploiting RHSA-2014:1400 could allow a remote attacker to read files accessible to the Apache POI library.
Affected versions are those of Apache POI that process OOXML documents and do not have the necessary security updates.
A valid workaround involves validating the OOXML documents before processing them with Apache POI to prevent remote entity resolution.