CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
83.1%
CentOS Errata and Security Advisory CESA-2014:1011
RESTEasy contains a JBoss project that provides frameworks to help build
RESTful Web Services and RESTful Java applications. It is a fully certified
and portable implementation of the JAX-RS specification.
It was found that the fix for CVE-2012-0818 was incomplete: external
parameter entities were not disabled when the
resteasy.document.expand.entity.references parameter was set to false.
A remote attacker able to send XML requests to a RESTEasy endpoint could
use this flaw to read files accessible to the user running the application
server, and potentially perform other more advanced XXE attacks.
(CVE-2014-3490)
This issue was discovered by David Jorm of Red Hat Product Security.
All resteasy-base users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2014-August/082631.html
Affected packages:
resteasy-base
resteasy-base-atom-provider
resteasy-base-jackson-provider
resteasy-base-javadoc
resteasy-base-jaxb-provider
resteasy-base-jaxrs
resteasy-base-jaxrs-all
resteasy-base-jaxrs-api
resteasy-base-jettison-provider
resteasy-base-providers-pom
resteasy-base-tjws
Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1011