CVE-2014-3529

Related Vulnerabilities: CVE-2014-3529  

It was found that Apache POI would resolve entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform more advanced XML External Entity (XXE) attacks.

It was found that Apache POI would resolve entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform more advanced XML External Entity (XXE) attacks.

Find out more about CVE-2014-3529 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat Product Security has determined that CVE-2014-3529 is not exploitable by default in JBoss Portal Platform as provided by Red Hat. This flaw would only be exploitable if the Apache POI library provided by JBoss Portal Platform were used by a custom application to process user-supplied XML documents.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat JBoss Portal Platform 6 apache-poi Will not fix
Red Hat JBoss Portal 5 apache-poi Will not fix
Red Hat JBoss Fuse Service Works 6 apache-poi Will not fix
Red Hat JBoss Data Virtualization 6 apache-poi Will not fix
Red Hat JBoss BRMS 6 apache-poi Will not fix
Red Hat JBoss BRMS 5 apache-poi Will not fix
Red Hat JBoss BPMS 6 apache-poi Will not fix
RHEV Manager 3 jasperreports-server-pro Will not fix