CVE Database

CVE-2012-0818

Impact: Moderate
Public: 2011-12-30
CWE: CWE-611
Bugzilla: 785631: CVE-2011-5245 CVE-2012-0818 RESTEasy: XML eXternal Entity (XXE) flaw

Details

The MITRE CVE dictionary describes this issue as:

RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.

Find out more about CVE-2012-0818 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 5
Base Metrics: AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
JBoss Enterprise BRMS Platform 5.2 RHSA-2012:0441 April 02, 2012
RHEV-M for Servers (org.ovirt.engine-root) RHSA-2012:0421 March 26, 2012
Red Hat JBoss BPMS 6.0 RHSA-2014:0371 April 03, 2014
Red Hat JBoss BRMS 6.0 RHSA-2014:0372 April 03, 2014
Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS (resteasy) RHSA-2012:1059 July 05, 2012
Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server (resteasy) RHSA-2012:1059 July 05, 2012
Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server (resteasy) RHSA-2012:1059 July 05, 2012
Red Hat JBoss Enterprise Application Platform 5.1 RHSA-2012:1056 July 05, 2012
Red Hat JBoss Portal 5.2 RHSA-2012:0519 April 25, 2012
Red Hat JBoss SOA Platform 5.3 RHSA-2012:1125 July 31, 2012
Red Hat JBoss Web Platform 5 for RHEL 4 AS (resteasy) RHSA-2012:1058 July 05, 2012
Red Hat JBoss Web Platform 5 for RHEL 5 Server (resteasy) RHSA-2012:1058 July 05, 2012
Red Hat JBoss Web Platform 5 for RHEL 6 Server (resteasy) RHSA-2012:1058 July 05, 2012
Red Hat JBoss Web Platform 5.1 RHSA-2012:1057 July 05, 2012
Red Hat Storage Console 2.1 RHSA-2013:1263 September 16, 2013

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.