6.5
CVSSv3

CVE-2014-3599

Published: 12/11/2019 Updated: 14/11/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Impact: Moderate Public Date: 2014-11-18 CWE: CWE-611 Bugzilla: 1130383: CVE-2014-3599 HornetQ REST: XXE due to insecure configuration of RestEasy It exists that HornetQ REST did not set the resteasy.document.expand.entity.references context parameter to false by default. A HornetQ REST application, which does not explicitly set the required context parameter to false, may be vulnerable to XML External Entity (XXE) attacks. A remote attacker able to send XML requests to a HornetQ REST endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat hornetq

Vendor Advisories

Impact: Moderate Public Date: 2014-11-18 CWE: CWE-611 Bugzilla: 1130383: CVE-2014-3599 HornetQ REST: XX ...