It was discovered that the jBPM runtime performed expansion of external parameter entities while executing BPMN2 files. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XML eXternal Entity (XXE) attacks.
Find out more about CVE-2014-8125 from the MITRE CVE dictionary dictionary and NIST NVD.
Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; and Red Hat JBoss Enterprise SOA Platform 4 and 5 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat JBoss Fuse Service Works 6 | jbpm | Will not fix |
Red Hat JBoss Enterprise SOA Platform 5 | jbpm | Will not fix |
Red Hat JBoss Enterprise SOA Platform 4 | jbpm | Will not fix |
Red Hat JBoss EAP 5 | jbpm | Will not fix |
Red Hat JBoss Data Virtualization 6 | jbpm | Will not fix |
Red Hat JBoss BRMS 6 | jbpm | Will not fix |
Red Hat JBoss BRMS 5 | jbpm | Will not fix |
Red Hat JBoss BPMS 6 | jbpm | Will not fix |