Vulnerability Name: | CVE-2014-3490 (CCN-95252) | ||||||||||||||||
Assigned: | 2014-07-23 | ||||||||||||||||
Published: | 2014-07-23 | ||||||||||||||||
Updated: | 2019-03-21 | ||||||||||||||||
Summary: | RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue. Note: this vulnerability exists because of an incomplete fix for CVE-2012-0818. | ||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-Other CWE-611 | ||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-3490 Source: CCN Type: RHSA-2014-1011 Moderate: resteasy-base security update Source: REDHAT Type: Third Party Advisory RHSA-2014:1011 Source: REDHAT Type: Third Party Advisory RHSA-2014:1039 Source: REDHAT Type: Third Party Advisory RHSA-2014:1040 Source: REDHAT Type: Third Party Advisory RHSA-2014:1298 Source: CCN Type: RHSA-2015-0125 Important: Red Hat JBoss Web Framework Kit 2.7.0 update Source: REDHAT Type: Third Party Advisory RHSA-2015:0125 Source: REDHAT Type: Third Party Advisory RHSA-2015:0675 Source: REDHAT Type: Third Party Advisory RHSA-2015:0720 Source: REDHAT Type: Third Party Advisory RHSA-2015:0765 Source: SECUNIA Type: Third Party Advisory 60019 Source: CCN Type: IBM Security Bulletin 1689963 JBoss RestEasy vulnerabilities in IBM Emptoris Contract Management (CVE-2014-3490) Source: CCN Type: RESTEasy Web site RESTEasy Source: CCN Type: Oracle CPUOct2018 Oracle Critical Patch Update Advisory - October 2018 Source: CONFIRM Type: Patch, Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Source: BID Type: Third Party Advisory, VDB Entry 69058 Source: CCN Type: BID-69058 RESTEasy Incomplete Fix XML Entity References Information Disclosure Vulnerability Source: XF Type: UNKNOWN resteasy-cve20143490-info-disc(95252) Source: CONFIRM Type: Third Party Advisory https://github.com/resteasy/Resteasy/pull/521 Source: CONFIRM Type: Third Party Advisory https://github.com/resteasy/Resteasy/pull/533 Source: MISC Type: Patch, Third Party Advisory https://github.com/ronsigal/Resteasy/commit/9b7d0f574cafdcf3bea5428f3145ab4908fc6d83 Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-3490 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |