It was found that the default context parameters as provided to RESTEasy deployments by JBoss EAP did not explicitly disable external entity expansion for RESTEasy. A remote attacker could use this flaw to perform XML External Entity (XXE) attacks on RESTEasy applications accepting XML input.
Find out more about CVE-2014-3481 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat JBoss Enterprise Application Platform 6.2 | RHSA-2014:0797 | 2014-06-26 |
Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server (jboss-as-jaxrs) | RHSA-2014:0799 | 2014-06-26 |
Red Hat JBoss Enterprise Application Platform 6 for RHEL 5 Server (jboss-as-jaxrs) | RHSA-2014:0798 | 2014-06-26 |
Platform | Package | State |
---|---|---|
Red Hat JBoss Portal Platform 6 | jboss-as-jaxrs | Will not fix |
Red Hat JBoss Operations Network 3 | jboss-as-jaxrs | Will not fix |
Red Hat JBoss Fuse Service Works 6 | jboss-as-jaxrs | Will not fix |
Red Hat JBoss Data Virtualization 6 | jboss-as-jaxrs | Will not fix |
Red Hat JBoss Data Grid 6 | jboss-as-jaxrs | Will not fix |