Vulnerability Name:

CVE-2011-5245 (CCN-72808)

Assigned:2012-01-11
Published:2012-01-11
Updated:2017-08-29
Summary:The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2011-5245

Source: MITRE
Type: CNA
CVE-2012-0818

Source: CCN
Type: RHSA-2012-0421
Moderate: rhevm security and bug fix update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0441

Source: CCN
Type: RHSA-2012-0519
Moderate: JBoss Enterprise Portal Platform 5.2.1 update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0519

Source: REDHAT
Type: UNKNOWN
RHSA-2012:1056

Source: REDHAT
Type: UNKNOWN
RHSA-2012:1057

Source: REDHAT
Type: UNKNOWN
RHSA-2012:1058

Source: CCN
Type: RHSA-2012-1059
Moderate: resteasy security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:1059

Source: REDHAT
Type: UNKNOWN
RHSA-2012:1125

Source: REDHAT
Type: UNKNOWN
RHSA-2014:0371

Source: REDHAT
Type: UNKNOWN
RHSA-2014:0372

Source: CCN
Type: SA47818
RESTEasy XML Entity References Information Disclosure Vulnerability

Source: CCN
Type: SA47832
RESTEasy JAXB XML Entity References Information Disclosure Vulnerability

Source: SECUNIA
Type: Vendor Advisory
47832

Source: SECUNIA
Type: Vendor Advisory
50084

Source: SECUNIA
Type: UNKNOWN
57716

Source: SECUNIA
Type: UNKNOWN
57719

Source: CCN
Type: RESTEasy Web site
RESTEasy

Source: OSVDB
Type: UNKNOWN
78680

Source: CCN
Type: OSVDB ID: 78679
RESTEasy XML Entity Reference Parsing Remote Information Disclosure

Source: CCN
Type: OSVDB ID: 78680
RESTEasy JAXB XML Entity Reference Parsing Remote Information Disclosure

Source: CCN
Type: BID-51748
RESTEasy XML Entity References Information Disclosure Vulnerability

Source: BID
Type: UNKNOWN
51766

Source: CCN
Type: BID-51766
RESTEasy JaxB XML Entity References Information Disclosure Vulnerability

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=785631

Source: XF
Type: UNKNOWN
resteasy-xml-info-disclosure(72808)

Source: XF
Type: UNKNOWN
resteasy-xml-info-disclosure(72808)

Source: CCN
Type: RESTEASY-637
RestEasy and XXE injection - Services that accept XML are vulnerable to XXE attacks

Source: CCN
Type: RESTEASY-647
RestEasy and XXE injection - Services that accept XML are vulnerable to XXE attacks, Part II

Source: CONFIRM
Type: Patch
https://issues.jboss.org/browse/RESTEASY-647

Source: CONFIRM
Type: UNKNOWN
https://issues.jboss.org/browse/RESTEASY/fixforversion/12318708

Source: CCN
Type: Mend Vulnerability Database
CVE-2012-0818

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:2.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:resteasy:*:*:*:*:*:*:*:* (Version <= 2.3.1)

  • Configuration CCN 1:
  • cpe:/a:redhat:rhel_application_stack:2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    redhat resteasy 1.0.0
    redhat resteasy 1.0.1
    redhat resteasy 1.0.2
    redhat resteasy 1.1
    redhat resteasy 1.2
    redhat resteasy 2.0.0
    redhat resteasy 2.0.1
    redhat resteasy 2.1.0
    redhat resteasy 2.2.0
    redhat resteasy 2.2.1
    redhat resteasy 2.2.2
    redhat resteasy 2.2.3
    redhat resteasy 2.3.0
    redhat resteasy *
    redhat rhel application stack 2