CVE-2016-3674

Impact:
Moderate
Public Date:
2016-03-15
CWE:
CWE-611
Bugzilla:
1321789: CVE-2016-3674 XStream: enabled processing of external entities
It was found that several XML parsers used by XStream had default settings that would expand entity references. A remote, unauthenticated attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

Find out more about CVE-2016-3674 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

CVSS v3 metrics

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss BRMS 6.3 RHSA-2016:2823 2016-11-28
Red Hat JBoss BPMS 6.3 RHSA-2016:2822 2016-11-28

Affected Packages State

Platform Package State
Red Hat Software Collections for Red Hat Enterprise Linux maven30-xstream Will not fix
Red Hat Satellite 6 xstream Will not fix
Red Hat OpenShift Enterprise 2 xstream Will not fix
Red Hat JBoss Portal Platform 6 xstream Will not fix
Red Hat JBoss Fuse Service Works 6 xstream Will not fix
Red Hat JBoss Enterprise SOA Platform 5 xstream Will not fix
Red Hat JBoss Data Grid 6 xstream Will not fix
Red Hat JBoss BRMS 5 xstream Will not fix
Red Hat JBoss A-MQ 6.2.1 xstream Will not fix
Red Hat Enterprise Linux 7 xstream Will not fix
RHEV Manager 3 jasperreports-server-pro Will not fix
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

External References

Last Modified