Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-0818 (GCVE-0-2012-0818)
Vulnerability from cvelistv5 – Published: 2012-11-23 20:00 – Updated: 2024-08-06 18:38- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:38:14.782Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"name": "RHSA-2012:1059",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html"
},
{
"name": "51748",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/51748"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.jboss.org/browse/RESTEASY-637"
},
{
"name": "RHSA-2012:1056",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html"
},
{
"name": "RHSA-2012:1058",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html"
},
{
"name": "51766",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/51766"
},
{
"name": "78679",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/78679"
},
{
"name": "RHSA-2012:0519",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
},
{
"name": "50084",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50084"
},
{
"name": "RHSA-2014:0371",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html"
},
{
"name": "RHSA-2012:1057",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html"
},
{
"name": "resteasy-xml-info-disclosure(72808)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808"
},
{
"name": "48954",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48954"
},
{
"name": "RHSA-2012:0441",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
},
{
"name": "47832",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47832"
},
{
"name": "57719",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/57719"
},
{
"name": "57716",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/57716"
},
{
"name": "47818",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47818"
},
{
"name": "RHSA-2014:0372",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html"
},
{
"name": "48697",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48697"
},
{
"name": "RHSA-2012:1125",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-12-30T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"name": "RHSA-2012:1059",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html"
},
{
"name": "51748",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/51748"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.jboss.org/browse/RESTEASY-637"
},
{
"name": "RHSA-2012:1056",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html"
},
{
"name": "RHSA-2012:1058",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html"
},
{
"name": "51766",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/51766"
},
{
"name": "78679",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/78679"
},
{
"name": "RHSA-2012:0519",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
},
{
"name": "50084",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50084"
},
{
"name": "RHSA-2014:0371",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html"
},
{
"name": "RHSA-2012:1057",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html"
},
{
"name": "resteasy-xml-info-disclosure(72808)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808"
},
{
"name": "48954",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48954"
},
{
"name": "RHSA-2012:0441",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
},
{
"name": "47832",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47832"
},
{
"name": "57719",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/57719"
},
{
"name": "57716",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/57716"
},
{
"name": "47818",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47818"
},
{
"name": "RHSA-2014:0372",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html"
},
{
"name": "48697",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48697"
},
{
"name": "RHSA-2012:1125",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-0818",
"datePublished": "2012-11-23T20:00:00.000Z",
"dateReserved": "2012-01-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T18:38:14.782Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2012-0818",
"date": "2026-05-20",
"epss": "0.01376",
"percentile": "0.80462"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.3.0\", \"matchCriteriaId\": \"1B9CAFED-9068-40C0-BD72-72D01F433DB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02480F00-302E-49DA-9FF3-41DC8A5A5E39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59E0CE57-59C4-485C-87DB-CD5E3EDFBFC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D332D87E-6270-4DC6-8EC2-8053890DA545\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0A15B5C-0538-4C1E-99FC-E4620D4157BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC38C8FE-62D3-4FC6-8BF0-6437A1FC9F26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B945333E-1B4E-4B60-B060-1186B8AC2527\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F75F5EC0-639A-40D3-871D-1FA38BF1A37E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22F557EA-05E8-4773-BB81-C0EBFE89C61F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EB842B8-6D95-484F-AE07-9C97BFD161D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC3D6E8C-E691-404C-9647-3ABFBF66FCDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"715FCD38-C218-45AB-824A-0EA7908BA951\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45635C9A-7AA2-42E0-95CC-C1DEC0AF60BC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.\"}, {\"lang\": \"es\", \"value\": \"RESTEasy anterior a v2.3.1 permite a atacantes remotos leer archivos de su elecci\\u00f3n a trav\\u00e9s de una referencia de entidad externa en un documento DOM, tambi\\u00e9n conocido como un ataque de inyecci\\u00f3n XML de entidad externa (XXE)\"}]",
"id": "CVE-2012-0818",
"lastModified": "2024-11-21T01:35:46.960",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-11-23T20:55:02.320",
"references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0441.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0519.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1056.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1057.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1058.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1059.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1125.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0371.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0372.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/47818\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/47832\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/48697\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/48954\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/50084\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/57716\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/57719\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.osvdb.org/78679\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/51748\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/51766\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=785631\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/72808\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://issues.jboss.org/browse/RESTEASY-637\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0441.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0519.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1056.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1057.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1058.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1059.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1125.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0371.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0372.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/47818\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/47832\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/48697\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/48954\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/50084\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/57716\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/57719\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/78679\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/51748\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/51766\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=785631\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/72808\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.jboss.org/browse/RESTEASY-637\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-0818\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-11-23T20:55:02.320\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.\"},{\"lang\":\"es\",\"value\":\"RESTEasy anterior a v2.3.1 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de una referencia de entidad externa en un documento DOM, tambi\u00e9n conocido como un ataque de inyecci\u00f3n XML de entidad externa (XXE)\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.0\",\"matchCriteriaId\":\"1B9CAFED-9068-40C0-BD72-72D01F433DB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02480F00-302E-49DA-9FF3-41DC8A5A5E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E0CE57-59C4-485C-87DB-CD5E3EDFBFC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D332D87E-6270-4DC6-8EC2-8053890DA545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A15B5C-0538-4C1E-99FC-E4620D4157BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC38C8FE-62D3-4FC6-8BF0-6437A1FC9F26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B945333E-1B4E-4B60-B060-1186B8AC2527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75F5EC0-639A-40D3-871D-1FA38BF1A37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22F557EA-05E8-4773-BB81-C0EBFE89C61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB842B8-6D95-484F-AE07-9C97BFD161D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC3D6E8C-E691-404C-9647-3ABFBF66FCDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"715FCD38-C218-45AB-824A-0EA7908BA951\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45635C9A-7AA2-42E0-95CC-C1DEC0AF60BC\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0441.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0519.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1056.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1057.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1058.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1059.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1125.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0371.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0372.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/47818\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47832\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48697\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48954\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/50084\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57716\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57719\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/78679\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/51748\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/51766\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=785631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/72808\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.jboss.org/browse/RESTEASY-637\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0441.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0519.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1057.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1125.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0371.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0372.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/47818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47832\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48954\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/50084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/78679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/51748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/51766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=785631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/72808\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.jboss.org/browse/RESTEASY-637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
}
}
CERTFR-2016-AVI-300
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Juniper Junos Space versions antérieures à 15.1R1
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eJuniper Junos Space versions ant\u00e9rieures \u00e0 15.1R1\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2010-1429",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1429"
},
{
"name": "CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"name": "CVE-2011-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4619"
},
{
"name": "CVE-2013-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2389"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2013-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3805"
},
{
"name": "CVE-2013-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3801"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2011-4576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4576"
},
{
"name": "CVE-2010-0738",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0738"
},
{
"name": "CVE-2014-6491",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6491"
},
{
"name": "CVE-2010-1428",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1428"
},
{
"name": "CVE-2013-1502",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1502"
},
{
"name": "CVE-2013-1544",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1544"
},
{
"name": "CVE-2013-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2392"
},
{
"name": "CVE-2014-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0429"
},
{
"name": "CVE-2013-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0166"
},
{
"name": "CVE-2014-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0456"
},
{
"name": "CVE-2013-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3804"
},
{
"name": "CVE-2012-0884",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0884"
},
{
"name": "CVE-2015-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2620"
},
{
"name": "CVE-2014-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0098"
},
{
"name": "CVE-2013-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3809"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2013-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3808"
},
{
"name": "CVE-2013-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3783"
},
{
"name": "CVE-2014-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
},
{
"name": "CVE-2014-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4263"
},
{
"name": "CVE-2014-6500",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6500"
},
{
"name": "CVE-2014-6495",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6495"
},
{
"name": "CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"name": "CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"name": "CVE-2014-6494",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6494"
},
{
"name": "CVE-2013-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2376"
},
{
"name": "CVE-2013-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2249"
},
{
"name": "CVE-2015-3209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3209"
},
{
"name": "CVE-2013-3794",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3794"
},
{
"name": "CVE-2011-4109",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4109"
},
{
"name": "CVE-2012-0818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0818"
},
{
"name": "CVE-2013-1511",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1511"
},
{
"name": "CVE-2013-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1862"
},
{
"name": "CVE-2014-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6478"
},
{
"name": "CVE-2014-6559",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6559"
},
{
"name": "CVE-2014-3413",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3413"
},
{
"name": "CVE-2014-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4244"
},
{
"name": "CVE-2013-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3802"
},
{
"name": "CVE-2013-3839",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3839"
},
{
"name": "CVE-2013-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3812"
},
{
"name": "CVE-2013-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2375"
},
{
"name": "CVE-2015-7753",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7753"
},
{
"name": "CVE-2014-6496",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6496"
},
{
"name": "CVE-2013-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6438"
},
{
"name": "CVE-2013-1896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1896"
},
{
"name": "CVE-2013-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1532"
},
{
"name": "CVE-2013-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2391"
},
{
"name": "CVE-2014-4264",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4264"
},
{
"name": "CVE-2013-3793",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3793"
},
{
"name": "CVE-2011-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5245"
},
{
"name": "CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"name": "CVE-2015-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0501"
},
{
"name": "CVE-2012-2333",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2333"
},
{
"name": "CVE-2013-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5908"
}
],
"links": [],
"reference": "CERTFR-2016-AVI-300",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10698 du 07 septembre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10659 du 07 septembre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10659\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10627 du 07 septembre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10627\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2016-AVI-300
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Juniper Junos Space versions antérieures à 15.1R1
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eJuniper Junos Space versions ant\u00e9rieures \u00e0 15.1R1\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2010-1429",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1429"
},
{
"name": "CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"name": "CVE-2011-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4619"
},
{
"name": "CVE-2013-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2389"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2013-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3805"
},
{
"name": "CVE-2013-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3801"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2011-4576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4576"
},
{
"name": "CVE-2010-0738",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0738"
},
{
"name": "CVE-2014-6491",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6491"
},
{
"name": "CVE-2010-1428",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1428"
},
{
"name": "CVE-2013-1502",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1502"
},
{
"name": "CVE-2013-1544",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1544"
},
{
"name": "CVE-2013-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2392"
},
{
"name": "CVE-2014-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0429"
},
{
"name": "CVE-2013-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0166"
},
{
"name": "CVE-2014-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0456"
},
{
"name": "CVE-2013-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3804"
},
{
"name": "CVE-2012-0884",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0884"
},
{
"name": "CVE-2015-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2620"
},
{
"name": "CVE-2014-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0098"
},
{
"name": "CVE-2013-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3809"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2013-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3808"
},
{
"name": "CVE-2013-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3783"
},
{
"name": "CVE-2014-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
},
{
"name": "CVE-2014-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4263"
},
{
"name": "CVE-2014-6500",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6500"
},
{
"name": "CVE-2014-6495",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6495"
},
{
"name": "CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"name": "CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"name": "CVE-2014-6494",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6494"
},
{
"name": "CVE-2013-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2376"
},
{
"name": "CVE-2013-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2249"
},
{
"name": "CVE-2015-3209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3209"
},
{
"name": "CVE-2013-3794",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3794"
},
{
"name": "CVE-2011-4109",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4109"
},
{
"name": "CVE-2012-0818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0818"
},
{
"name": "CVE-2013-1511",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1511"
},
{
"name": "CVE-2013-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1862"
},
{
"name": "CVE-2014-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6478"
},
{
"name": "CVE-2014-6559",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6559"
},
{
"name": "CVE-2014-3413",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3413"
},
{
"name": "CVE-2014-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4244"
},
{
"name": "CVE-2013-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3802"
},
{
"name": "CVE-2013-3839",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3839"
},
{
"name": "CVE-2013-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3812"
},
{
"name": "CVE-2013-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2375"
},
{
"name": "CVE-2015-7753",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7753"
},
{
"name": "CVE-2014-6496",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6496"
},
{
"name": "CVE-2013-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6438"
},
{
"name": "CVE-2013-1896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1896"
},
{
"name": "CVE-2013-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1532"
},
{
"name": "CVE-2013-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2391"
},
{
"name": "CVE-2014-4264",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4264"
},
{
"name": "CVE-2013-3793",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3793"
},
{
"name": "CVE-2011-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5245"
},
{
"name": "CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"name": "CVE-2015-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0501"
},
{
"name": "CVE-2012-2333",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2333"
},
{
"name": "CVE-2013-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5908"
}
],
"links": [],
"reference": "CERTFR-2016-AVI-300",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10698 du 07 septembre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10659 du 07 septembre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10659\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10627 du 07 septembre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10627\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
FKIE_CVE-2012-0818
Vulnerability from fkie_nvd - Published: 2012-11-23 20:55 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| redhat | resteasy | * | |
| redhat | resteasy | 1.0.0 | |
| redhat | resteasy | 1.0.1 | |
| redhat | resteasy | 1.0.2 | |
| redhat | resteasy | 1.1 | |
| redhat | resteasy | 1.2 | |
| redhat | resteasy | 2.0.0 | |
| redhat | resteasy | 2.0.1 | |
| redhat | resteasy | 2.1.0 | |
| redhat | resteasy | 2.2.0 | |
| redhat | resteasy | 2.2.1 | |
| redhat | resteasy | 2.2.2 | |
| redhat | resteasy | 2.2.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9CAFED-9068-40C0-BD72-72D01F433DB0",
"versionEndIncluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02480F00-302E-49DA-9FF3-41DC8A5A5E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "59E0CE57-59C4-485C-87DB-CD5E3EDFBFC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D332D87E-6270-4DC6-8EC2-8053890DA545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A15B5C-0538-4C1E-99FC-E4620D4157BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AC38C8FE-62D3-4FC6-8BF0-6437A1FC9F26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B945333E-1B4E-4B60-B060-1186B8AC2527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F75F5EC0-639A-40D3-871D-1FA38BF1A37E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "22F557EA-05E8-4773-BB81-C0EBFE89C61F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB842B8-6D95-484F-AE07-9C97BFD161D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC3D6E8C-E691-404C-9647-3ABFBF66FCDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "715FCD38-C218-45AB-824A-0EA7908BA951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "45635C9A-7AA2-42E0-95CC-C1DEC0AF60BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack."
},
{
"lang": "es",
"value": "RESTEasy anterior a v2.3.1 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de una referencia de entidad externa en un documento DOM, tambi\u00e9n conocido como un ataque de inyecci\u00f3n XML de entidad externa (XXE)"
}
],
"id": "CVE-2012-0818",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-11-23T20:55:02.320",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47818"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47832"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/48697"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/48954"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/50084"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/57716"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/57719"
},
{
"source": "secalert@redhat.com",
"url": "http://www.osvdb.org/78679"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/51748"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/51766"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://issues.jboss.org/browse/RESTEASY-637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47818"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47832"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48697"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48954"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/50084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/57716"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/57719"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/78679"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/51748"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/51766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://issues.jboss.org/browse/RESTEASY-637"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-WRRH-G7H3-GQMX
Vulnerability from github – Published: 2022-05-17 01:49 – Updated: 2022-07-13 18:42RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-client"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.3.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2012-0818"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2022-07-13T18:42:09Z",
"nvd_published_at": "2012-11-23T20:55:00Z",
"severity": "MODERATE"
},
"details": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"id": "GHSA-wrrh-g7h3-gqmx",
"modified": "2022-07-13T18:42:09Z",
"published": "2022-05-17T01:49:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20200229045254/https://www.securityfocus.com/bid/51766"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20200229044434/http://www.securityfocus.com/bid/51748"
},
{
"type": "WEB",
"url": "https://issues.jboss.org/browse/RESTEASY-637"
},
{
"type": "PACKAGE",
"url": "https://github.com/resteasy/Resteasy"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2012-0818"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2014:0372"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2014:0371"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2013:1263"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:1125"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:1059"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:1058"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:1057"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:1056"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:0519"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:0441"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2012:0421"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy"
}
GSD-2012-0818
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-0818",
"description": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"id": "GSD-2012-0818",
"references": [
"https://access.redhat.com/errata/RHSA-2014:0372",
"https://access.redhat.com/errata/RHSA-2014:0371",
"https://access.redhat.com/errata/RHSA-2013:1263",
"https://access.redhat.com/errata/RHSA-2012:1125",
"https://access.redhat.com/errata/RHSA-2012:1059",
"https://access.redhat.com/errata/RHSA-2012:1058",
"https://access.redhat.com/errata/RHSA-2012:1057",
"https://access.redhat.com/errata/RHSA-2012:1056",
"https://access.redhat.com/errata/RHSA-2012:0519",
"https://access.redhat.com/errata/RHSA-2012:0441",
"https://access.redhat.com/errata/RHSA-2012:0421"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-0818"
],
"details": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"id": "GSD-2012-0818",
"modified": "2023-12-13T01:20:14.006210Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0818",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-1125.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html"
},
{
"name": "http://secunia.com/advisories/50084",
"refsource": "MISC",
"url": "http://secunia.com/advisories/50084"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-0371.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-0372.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html"
},
{
"name": "http://secunia.com/advisories/57716",
"refsource": "MISC",
"url": "http://secunia.com/advisories/57716"
},
{
"name": "http://secunia.com/advisories/57719",
"refsource": "MISC",
"url": "http://secunia.com/advisories/57719"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-0441.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-0519.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
},
{
"name": "http://secunia.com/advisories/48697",
"refsource": "MISC",
"url": "http://secunia.com/advisories/48697"
},
{
"name": "http://secunia.com/advisories/48954",
"refsource": "MISC",
"url": "http://secunia.com/advisories/48954"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-1056.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-1057.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-1058.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-1059.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html"
},
{
"name": "http://secunia.com/advisories/47818",
"refsource": "MISC",
"url": "http://secunia.com/advisories/47818"
},
{
"name": "http://secunia.com/advisories/47832",
"refsource": "MISC",
"url": "http://secunia.com/advisories/47832"
},
{
"name": "http://www.osvdb.org/78679",
"refsource": "MISC",
"url": "http://www.osvdb.org/78679"
},
{
"name": "http://www.securityfocus.com/bid/51748",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/51748"
},
{
"name": "http://www.securityfocus.com/bid/51766",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/51766"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808"
},
{
"name": "https://issues.jboss.org/browse/RESTEASY-637",
"refsource": "MISC",
"url": "https://issues.jboss.org/browse/RESTEASY-637"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=785631",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,2.3.1)",
"affected_versions": "All versions before 2.3.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-200",
"CWE-937"
],
"date": "2022-07-13",
"description": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"fixed_versions": [
"2.3.1"
],
"identifier": "CVE-2012-0818",
"identifiers": [
"GHSA-wrrh-g7h3-gqmx",
"CVE-2012-0818"
],
"not_impacted": "All versions starting from 2.3.1",
"package_slug": "maven/org.jboss.resteasy/resteasy-client",
"pubdate": "2022-05-17",
"solution": "Upgrade to version 2.3.1 or above.",
"title": "Exposure of Sensitive Information to an Unauthorized Actor",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2012-0818",
"https://bugzilla.redhat.com/show_bug.cgi?id=785631",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/72808",
"https://issues.jboss.org/browse/RESTEASY-637",
"http://rhn.redhat.com/errata/RHSA-2012-0441.html",
"http://rhn.redhat.com/errata/RHSA-2012-0519.html",
"http://rhn.redhat.com/errata/RHSA-2012-1056.html",
"http://rhn.redhat.com/errata/RHSA-2012-1057.html",
"http://rhn.redhat.com/errata/RHSA-2012-1058.html",
"http://rhn.redhat.com/errata/RHSA-2012-1059.html",
"http://rhn.redhat.com/errata/RHSA-2012-1125.html",
"http://rhn.redhat.com/errata/RHSA-2014-0371.html",
"http://rhn.redhat.com/errata/RHSA-2014-0372.html",
"https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6",
"https://github.com/advisories/GHSA-wrrh-g7h3-gqmx"
],
"uuid": "724cb100-aa53-4796-8712-0425d08f3a10"
},
{
"affected_range": "(,2.3.1)",
"affected_versions": "All versions before 2.3.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-200",
"CWE-937"
],
"date": "2017-08-28",
"description": "RESTEasy allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"fixed_versions": [
"2.3.1"
],
"identifier": "CVE-2012-0818",
"identifiers": [
"CVE-2012-0818"
],
"not_impacted": "All versions after 2.3.1",
"package_slug": "maven/org.jboss.resteasy/resteasy-jaxrs",
"pubdate": "2012-11-23",
"solution": "Upgrade to version 2.3.1 or above.",
"title": "Information Exposure",
"urls": [
"https://issues.jboss.org/browse/RESTEASY-637",
"https://issues.jboss.org/browse/RESTEASY-647",
"https://issues.jboss.org/browse/RESTEASY-659"
],
"uuid": "3d04b36a-467a-4ffe-91cc-7cf0c11327e7"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0818"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2012:1058",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html"
},
{
"name": "47832",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47832"
},
{
"name": "RHSA-2012:0441",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
},
{
"name": "https://issues.jboss.org/browse/RESTEASY-637",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://issues.jboss.org/browse/RESTEASY-637"
},
{
"name": "RHSA-2012:0519",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
},
{
"name": "50084",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/50084"
},
{
"name": "51766",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/51766"
},
{
"name": "RHSA-2012:1056",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html"
},
{
"name": "51748",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/51748"
},
{
"name": "RHSA-2012:1125",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html"
},
{
"name": "78679",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/78679"
},
{
"name": "RHSA-2012:1059",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html"
},
{
"name": "47818",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47818"
},
{
"name": "RHSA-2012:1057",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=785631",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"name": "48697",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48697"
},
{
"name": "48954",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48954"
},
{
"name": "57716",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/57716"
},
{
"name": "RHSA-2014:0371",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html"
},
{
"name": "57719",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/57719"
},
{
"name": "RHSA-2014:0372",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html"
},
{
"name": "resteasy-xml-info-disclosure(72808)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T03:26Z",
"publishedDate": "2012-11-23T20:55Z"
}
}
}
RHSA-2012:0421
Vulnerability from csaf_redhat - Published: 2012-03-26 15:16 - Updated: 2025-11-21 17:40The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated rhevm packages that fix one security issue and various bugs are now\navailable.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Enterprise Virtualization Manager is a visual tool for centrally\nmanaging collections of virtual machines running Red Hat Enterprise Linux\nand Microsoft Windows. These packages also include the Red Hat Enterprise\nVirtualization Manager REST (Representational State Transfer) API, a set of\nscriptable commands that give administrators the ability to perform queries\nand operations on Red Hat Enterprise Virtualization Manager.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat Enterprise\nVirtualization Manager REST API submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs:\n\n* Previously the REST API was ignoring the \"Accept\" header. This made it\nimpossible to retrieve detailed information about specific sub-collections,\nincluding hosts and disks. The REST API has been updated and now processes\nthe \"Accept\" header as originally intended. (BZ#771369)\n\n* The \"start_time\" Virtual Machine property was previously always set. This\nmeant that even Virtual Machines that were stopped, had a value for\n\"start_time\". An update has been made to ensure that the \"start_time\"\nproperty is only set when the Virtual Machine has been started, and is\nrunning. (BZ#772975)\n\n* The \u0027rhevm-setup\u0027 script previously only ran successfully on systems with\ntheir locale set to \u0027en_US.UTF-8\u0027, \u0027en_US.utf-8\u0027, or \u0027en_US.utf8\u0027. The\nscript has since been updated to also run successfully in additional\nlocales, including \u0027ja_JP.UTF-8\u0027. (BZ#784860)\n\n* The REST API did not previously validate that all required parameters\nwere provided when enabling power management. The response code returned\nwould also incorrectly indicate the operation had succeeded where\nmandatory parameters were not supplied. An update has been made to ensure\nthat the power management parameters are validated correctly. (BZ#785744)\n\n* Previously no warning or error was issued when the amount of free disk\nspace on a host was low. When no free disk space remained on the host it\nwould become non-responsive with no prior warning. An update has been made\nto report a warning in the audit log when a host\u0027s free disk space is less\nthan 1000 MB, and an error when a host\u0027s free disk space is less than 500\nMB. (BZ#786132)\n\n* When importing Virtual Machines no notification was provided if the MAC\naddress of the network interface card clashed with that of an existing\nVirtual Machine. Now when this occurs a message is printed to the audit\nlog, highlighting the need for manual intervention. (BZ#795416)\n\n* Previously it was not possible to set more, or less, than one value for\nSpiceSecureChannels using the rhevm-config tool. This meant it was not\npossible to encrypt all SPICE channels. The rhevm-config tool has been\nupdated and it is now possible to encrypt all SPICE channels, by adding\nthem to the SpiceSecureChannels configuration key. (BZ#784012)\n\nAll Red Hat Enterprise Virtualization users are advised to upgrade to these\nupdated packages, which address this vulnerability and fix these bugs.\nRefer to the Solution section for information about installing this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0421",
"url": "https://access.redhat.com/errata/RHSA-2012:0421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html",
"url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html"
},
{
"category": "external",
"summary": "785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0421.json"
}
],
"title": "Red Hat Security Advisory: rhevm security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:40:10+00:00",
"generator": {
"date": "2025-11-21T17:40:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:0421",
"initial_release_date": "2012-03-26T15:16:00+00:00",
"revision_history": [
{
"date": "2012-03-26T15:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-03-26T15:17:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:40:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-M for Servers",
"product": {
"name": "RHEV-M for Servers",
"product_id": "6Server-RHEV-S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-notification-service@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-log-collector@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-iso-uploader@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-genericapi@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-restapi@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-debuginfo@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-jboss-deps@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-webadmin-portal@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-backend@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-dbscripts@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-config@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-userportal@3.0.3_0001-3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"product": {
"name": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"product_id": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-tools-common@3.0.3_0001-3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-0:3.0.3_0001-3.el6.src",
"product": {
"name": "rhevm-0:3.0.3_0001-3.el6.src",
"product_id": "rhevm-0:3.0.3_0001-3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@3.0.3_0001-3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:3.0.3_0001-3.el6.src as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src"
},
"product_reference": "rhevm-0:3.0.3_0001-3.el6.src",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-config-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers",
"product_id": "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64"
},
"product_reference": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64",
"relates_to_product_reference": "6Server-RHEV-S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5245",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src",
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5245"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5245"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-03-26T15:16:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Follow the upgrade\nprocedure in the Red Hat Enterprise Virtualization\nInstallation Guide to install these updated packages:\n\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html",
"product_ids": [
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src",
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0421"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src",
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
},
{
"cve": "CVE-2012-0818",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src",
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0818"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-03-26T15:16:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Follow the upgrade\nprocedure in the Red Hat Enterprise Virtualization\nInstallation Guide to install these updated packages:\n\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html",
"product_ids": [
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src",
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0421"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src",
"6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64",
"6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
}
]
}
RHSA-2012:0441
Vulnerability from csaf_redhat - Published: 2012-04-02 20:05 - Updated: 2025-11-21 17:40message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
JBoss Enterprise BRMS Platform 5.2
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_brms_platform:5.2
|
— |
Vendor Fix
fix
|
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
JBoss Enterprise BRMS Platform 5.2
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_brms_platform:5.2
|
— |
Vendor Fix
fix
|
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
JBoss Enterprise BRMS Platform 5.2
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_brms_platform:5.2
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "JBoss Enterprise BRMS Platform 5.2.0 roll up patch 1, which fixes two\nsecurity issues, various bugs, and adds enhancements, is now available from\nthe Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise BRMS Platform is a business rules management system for\nthe management, storage, creation, modification, and deployment of JBoss\nRules.\n\nThis roll up patch serves as a cumulative upgrade for JBoss Enterprise BRMS\nPlatform 5.2.0. It includes various bug fixes and enhancements. The\nfollowing security issues are also fixed with this release:\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nIt was found that the Attribute Exchange (AX) extension of OpenID4Java was\nnot checking to ensure attributes were signed. If AX was being used to\nreceive information that an application only trusts the identity provider\nto assert, a remote attacker could use this flaw to conduct\nman-in-the-middle attacks and compromise the integrity of the information\nvia a specially-crafted request. By default, only the JBoss Seam openid\nexample application uses OpenID4Java. (CVE-2011-4314)\n\nWarning: Before applying the update, back up your existing JBoss Enterprise\nBRMS Platform installation (including its databases, applications,\nconfiguration files, and so on).\n\nAll users of JBoss Enterprise BRMS Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to apply this roll up patch.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0441",
"url": "https://access.redhat.com/errata/RHSA-2012:0441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.2.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.2.0"
},
{
"category": "external",
"summary": "754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "external",
"summary": "785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0441.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.2.0 update",
"tracking": {
"current_release_date": "2025-11-21T17:40:11+00:00",
"generator": {
"date": "2025-11-21T17:40:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:0441",
"initial_release_date": "2012-04-02T20:05:00+00:00",
"revision_history": [
{
"date": "2012-04-02T20:05:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-04-02T19:30:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:40:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBoss Enterprise BRMS Platform 5.2",
"product": {
"name": "JBoss Enterprise BRMS Platform 5.2",
"product_id": "JBoss Enterprise BRMS Platform 5.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:5.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-4314",
"discovery_date": "2011-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "754386"
}
],
"notes": [
{
"category": "description",
"text": "message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "extension): MITM due to improper validation of AX attribute signatures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Enterprise BRMS Platform 5.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4314"
},
{
"category": "external",
"summary": "RHBZ#754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4314",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4314"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314"
}
],
"release_date": "2011-05-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-02T20:05:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise BRMS Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the JBoss Enterprise BRMS Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the JBoss\nEnterprise BRMS Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"JBoss Enterprise BRMS Platform 5.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0441"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"JBoss Enterprise BRMS Platform 5.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "extension): MITM due to improper validation of AX attribute signatures"
},
{
"cve": "CVE-2011-5245",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Enterprise BRMS Platform 5.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5245"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5245"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-02T20:05:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise BRMS Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the JBoss Enterprise BRMS Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the JBoss\nEnterprise BRMS Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"JBoss Enterprise BRMS Platform 5.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0441"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"JBoss Enterprise BRMS Platform 5.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
},
{
"cve": "CVE-2012-0818",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Enterprise BRMS Platform 5.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0818"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-02T20:05:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise BRMS Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the JBoss Enterprise BRMS Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the JBoss\nEnterprise BRMS Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"JBoss Enterprise BRMS Platform 5.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0441"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"JBoss Enterprise BRMS Platform 5.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
}
]
}
RHSA-2012:0519
Vulnerability from csaf_redhat - Published: 2012-04-25 02:03 - Updated: 2025-11-21 17:40message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Portal 5.2
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_portal_platform:5.2
|
— |
Vendor Fix
fix
|
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Portal 5.2
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_portal_platform:5.2
|
— |
Vendor Fix
fix
|
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Portal 5.2
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_portal_platform:5.2
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "JBoss Enterprise Portal Platform 5.2.1, which fixes two security issues\nand various bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Portal Platform is the open source implementation of the\nJava EE suite of services and Portal services running atop JBoss Enterprise\nApplication Platform. It comprises a set of offerings for enterprise\ncustomers who are looking for pre-configured profiles of JBoss Enterprise\nMiddleware components that have been tested and certified together to\nprovide an integrated experience.\n\nThis release of JBoss Enterprise Portal Platform 5.2.1 serves as a\nreplacement for JBoss Enterprise Portal Platform 5.2.0, and includes bug\nfixes. Refer to the JBoss Enterprise Portal Platform 5.2.1 Release Notes\nfor information on the most significant of these changes. The Release Notes\nwill be available shortly from\nhttps://docs.redhat.com/docs/en-US/index.html\n\nThe following security issues are also fixed with this release:\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nIt was found that the Attribute Exchange (AX) extension of OpenID4Java was\nnot checking to ensure attributes were signed. If AX was being used to\nreceive information that an application only trusts the identity provider\nto assert, a remote attacker could use this flaw to conduct\nman-in-the-middle attacks and compromise the integrity of the information\nvia a specially-crafted request. By default, only the JBoss Seam openid\nexample application uses OpenID4Java. (CVE-2011-4314)\n\nWarning: Before applying this update, back up all applications deployed on\nJBoss Enterprise Portal Platform, along with all customized configuration\nfiles.\n\nAll users of JBoss Enterprise Portal Platform 5.2.0 as provided from the\nRed Hat Customer Portal are advised to upgrade to JBoss Enterprise Portal\nPlatform 5.2.1.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0519",
"url": "https://access.redhat.com/errata/RHSA-2012:0519"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/index.html",
"url": "https://docs.redhat.com/docs/en-US/index.html"
},
{
"category": "external",
"summary": "754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "external",
"summary": "785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0519.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.1 update",
"tracking": {
"current_release_date": "2025-11-21T17:40:18+00:00",
"generator": {
"date": "2025-11-21T17:40:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:0519",
"initial_release_date": "2012-04-25T02:03:00+00:00",
"revision_history": [
{
"date": "2012-04-25T02:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-04-25T02:10:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:40:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Portal 5.2",
"product": {
"name": "Red Hat JBoss Portal 5.2",
"product_id": "Red Hat JBoss Portal 5.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-4314",
"discovery_date": "2011-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "754386"
}
],
"notes": [
{
"category": "description",
"text": "message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "extension): MITM due to improper validation of AX attribute signatures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Portal 5.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4314"
},
{
"category": "external",
"summary": "RHBZ#754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4314",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4314"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314"
}
],
"release_date": "2011-05-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-25T02:03:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files.",
"product_ids": [
"Red Hat JBoss Portal 5.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0519"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Portal 5.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "extension): MITM due to improper validation of AX attribute signatures"
},
{
"cve": "CVE-2011-5245",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Portal 5.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5245"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5245"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-25T02:03:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files.",
"product_ids": [
"Red Hat JBoss Portal 5.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0519"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Portal 5.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
},
{
"cve": "CVE-2012-0818",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Portal 5.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0818"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-25T02:03:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files.",
"product_ids": [
"Red Hat JBoss Portal 5.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0519"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Portal 5.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
}
]
}
RHSA-2012:1056
Vulnerability from csaf_redhat - Published: 2012-07-05 19:19 - Updated: 2025-11-21 17:40The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Enterprise Application Platform 5.1
Red Hat / Red Hat JBoss Enterprise Application Platform
|
cpe:/a:redhat:jboss_enterprise_application_platform:5.1
|
— |
Vendor Fix
fix
|
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Enterprise Application Platform 5.1
Red Hat / Red Hat JBoss Enterprise Application Platform
|
cpe:/a:redhat:jboss_enterprise_application_platform:5.1
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for JBoss Enterprise Application Platform 5.1.2 that fixes one\nsecurity issue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform\u0027s \"jboss-as/server/[PROFILE]/deploy/\" directory, along\nwith all other customized configuration files.\n\nAll users of JBoss Enterprise Application Platform 5.1.2 as provided from\nthe Red Hat Customer Portal are advised to install this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:1056",
"url": "https://access.redhat.com/errata/RHSA-2012:1056"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.1.2",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.1.2"
},
{
"category": "external",
"summary": "785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1056.json"
}
],
"title": "Red Hat Security Advisory: resteasy security update",
"tracking": {
"current_release_date": "2025-11-21T17:40:49+00:00",
"generator": {
"date": "2025-11-21T17:40:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:1056",
"initial_release_date": "2012-07-05T19:19:00+00:00",
"revision_history": [
{
"date": "2012-07-05T19:19:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:45:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:40:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 5.1",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 5.1",
"product_id": "Red Hat JBoss Enterprise Application Platform 5.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5245",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 5.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5245"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5245"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-07-05T19:19:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 5.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1056"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 5.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
},
{
"cve": "CVE-2012-0818",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 5.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0818"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-07-05T19:19:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 5.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1056"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 5.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
}
]
}
RHSA-2012:1057
Vulnerability from csaf_redhat - Published: 2012-07-05 19:20 - Updated: 2025-11-21 17:40The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Web Platform 5.1
Red Hat / Red Hat JBoss Web Platform
|
cpe:/a:redhat:jboss_enterprise_web_platform:5.1
|
— |
Vendor Fix
fix
|
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Web Platform 5.1
Red Hat / Red Hat JBoss Web Platform
|
cpe:/a:redhat:jboss_enterprise_web_platform:5.1
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for JBoss Enterprise Web Platform 5.1.2 that fixes one security\nissue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise Web\nPlatform\u0027s \"jboss-as-web/server/[PROFILE]/deploy/\" directory and any other\ncustomized configuration files.\n\nAll users of JBoss Enterprise Web Platform 5.1.2 as provided from the Red\nHat Customer Portal are advised to install this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:1057",
"url": "https://access.redhat.com/errata/RHSA-2012:1057"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=securityPatches\u0026version=5.1.2",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=securityPatches\u0026version=5.1.2"
},
{
"category": "external",
"summary": "785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1057.json"
}
],
"title": "Red Hat Security Advisory: resteasy security update",
"tracking": {
"current_release_date": "2025-11-21T17:40:49+00:00",
"generator": {
"date": "2025-11-21T17:40:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:1057",
"initial_release_date": "2012-07-05T19:20:00+00:00",
"revision_history": [
{
"date": "2012-07-05T19:20:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-07-05T19:27:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:40:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Platform 5.1",
"product": {
"name": "Red Hat JBoss Web Platform 5.1",
"product_id": "Red Hat JBoss Web Platform 5.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5245",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Platform 5.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5245"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5245"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-07-05T19:20:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.",
"product_ids": [
"Red Hat JBoss Web Platform 5.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1057"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Platform 5.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
},
{
"cve": "CVE-2012-0818",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2012-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "785631"
}
],
"notes": [
{
"category": "description",
"text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: XML eXternal Entity (XXE) flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Platform 5.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0818"
},
{
"category": "external",
"summary": "RHBZ#785631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818"
}
],
"release_date": "2011-12-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-07-05T19:20:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.",
"product_ids": [
"Red Hat JBoss Web Platform 5.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1057"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Platform 5.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "RESTEasy: XML eXternal Entity (XXE) flaw"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.