CVE-2014-3490

Impact:
Moderate
Public Date:
2014-07-23
CWE:
CWE-611
Bugzilla:
1107901: CVE-2014-3490 RESTEasy: XXE via parameter entities
It was found that the fix for CVE-2012-0818 was incomplete: external parameter entities were not disabled when the resteasy.document.expand.entity.references parameter was set to false. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

Find out more about CVE-2014-3490 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss Enterprise Application Platform 6.3 RHSA-2014:1039 2014-08-11
Red Hat JBoss Portal 6.2 RHSA-2015:1009 2015-05-14
Red Hat JBoss BPMS 6.0 RHSA-2015:0234 2015-02-17
Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server (resteasy) RHSA-2014:1040 2014-08-11
Red Hat JBoss Data Virtualization 6.0 RHSA-2015:0765 2015-03-31
Red Hat JBoss Operations Network 3.3 RHSA-2014:1904 2014-11-25
Red Hat Enterprise Linux 7 (resteasy-base) RHSA-2014:1011 2014-08-06
Red Hat JBoss Enterprise Application Platform 6 for RHEL 5 Server (resteasy) RHSA-2014:1040 2014-08-11
Red Hat JBoss Data Grid 6.3 RHSA-2014:1298 2014-09-24
Red Hat JBoss Data Virtualization 6.1 RHSA-2015:0675 2015-03-11
Red Hat JBoss Fuse Service Works 6.0 RHSA-2015:0720 2015-03-24
Red Hat JBoss BRMS 6.0 RHSA-2015:0235 2015-02-17
Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 7 Server (resteasy) RHSA-2014:1040 2014-08-11

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 resteasy Will not fix
Red Hat Subscription Asset Manager 1 candlepin Not affected
Red Hat Satellite 6 resteasy Fix deferred
Red Hat JBoss Portal 5 resteasy Will not fix
Red Hat JBoss Enterprise SOA Platform 5 resteasy Will not fix
Red Hat JBoss EAP 5 resteasy Will not fix
Red Hat JBoss BRMS 5 resteasy Will not fix
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

Acknowledgements

This issue was discovered by David Jorm of Red Hat Product Security.
Last Modified