Lucene search

K
centosCentOS ProjectCESA-2014:1011
HistoryAug 06, 2014 - 2:38 p.m.

resteasy security update

2014-08-0614:38:38
CentOS Project
lists.centos.org
45

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.9%

CentOS Errata and Security Advisory CESA-2014:1011

RESTEasy contains a JBoss project that provides frameworks to help build
RESTful Web Services and RESTful Java applications. It is a fully certified
and portable implementation of the JAX-RS specification.

It was found that the fix for CVE-2012-0818 was incomplete: external
parameter entities were not disabled when the
resteasy.document.expand.entity.references parameter was set to false.
A remote attacker able to send XML requests to a RESTEasy endpoint could
use this flaw to read files accessible to the user running the application
server, and potentially perform other more advanced XXE attacks.
(CVE-2014-3490)

This issue was discovered by David Jorm of Red Hat Product Security.

All resteasy-base users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2014-August/082631.html

Affected packages:
resteasy-base
resteasy-base-atom-provider
resteasy-base-jackson-provider
resteasy-base-javadoc
resteasy-base-jaxb-provider
resteasy-base-jaxrs
resteasy-base-jaxrs-all
resteasy-base-jaxrs-api
resteasy-base-jettison-provider
resteasy-base-providers-pom
resteasy-base-tjws

Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1011

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.9%