RHSA-2014:1298 - Security Advisory
Security Advisory: Moderate
Red Hat JBoss Data Grid 6.3.1, which fixes one security issue and multiple
bugs, is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
Red Hat JBoss Data Grid is a distributed in-memory data grid, based on
This release of Red Hat JBoss Data Grid 6.3.1 serves as a replacement for
Red Hat JBoss Data Grid 6.3.0. It includes various bug fixes which are
detailed in the Red Hat JBoss Data Grid 6.3.1 Release Notes. The Release
Notes are available at:
This update also fixes the following security issue:
It was found that the external parameter entities were not disabled when
the resteasy.document.expand.entity.references parameter was set to false.
A remote attacker able to send XML requests to a RESTEasy endpoint could
use this flaw to read files accessible to the user running the application
server, and potentially perform other more advanced XXE attacks.
The CVE-2014-3490 issue was discovered by David Jorm of Red Hat Product
All users of Red Hat JBoss Data Grid 6.3.0 as provided from the Red Hat
Customer Portal are advised to upgrade to Red Hat JBoss Data Grid 6.3.1.
The References section of this erratum contains a download link (you must
log in to download the update). Before applying this update, back up your
existing JBoss Data Grid installation.
- Red Hat JBoss Data Grid Text-Only Advisories x86_64
- BZ - 1107901 - CVE-2014-3490 RESTEasy: XXE via parameter entities
Red Hat JBoss Data Grid Text-Only Advisories