Rapid7 Vulnerability & Exploit Database

RHSA-2014:1011: resteasy-base security update

Back to Search

RHSA-2014:1011: resteasy-base security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
08/19/2014
Created
07/25/2018
Added
09/24/2014
Modified
07/04/2017

Description

RESTEasy contains a JBoss project that provides frameworks to help buildRESTful Web Services and RESTful Java applications. It is a fully certifiedand portable implementation of the JAX-RS specification.It was found that the fix for CVE-2012-0818 was incomplete: externalparameter entities were not disabled when theresteasy.document.expand.entity.references parameter was set to false.A remote attacker able to send XML requests to a RESTEasy endpoint coulduse this flaw to read files accessible to the user running the applicationserver, and potentially perform other more advanced XXE attacks.(CVE-2014-3490)This issue was discovered by David Jorm of Red Hat Product Security.All resteasy-base users are advised to upgrade to these updated packages,which contain a backported patch to correct this issue.

Solution(s)

  • redhat-upgrade-resteasy-base
  • redhat-upgrade-resteasy-base-atom-provider
  • redhat-upgrade-resteasy-base-jackson-provider
  • redhat-upgrade-resteasy-base-javadoc
  • redhat-upgrade-resteasy-base-jaxb-provider
  • redhat-upgrade-resteasy-base-jaxrs
  • redhat-upgrade-resteasy-base-jaxrs-all
  • redhat-upgrade-resteasy-base-jaxrs-api
  • redhat-upgrade-resteasy-base-jettison-provider
  • redhat-upgrade-resteasy-base-providers-pom
  • redhat-upgrade-resteasy-base-tjws

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;