Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2012-0818
Vulnerability from cvelistv5
Published
2012-11-23 20:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.782Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "name": "RHSA-2012:1059", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html" }, { "name": "51748", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51748" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.jboss.org/browse/RESTEASY-637" }, { "name": "RHSA-2012:1056", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html" }, { "name": "RHSA-2012:1058", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html" }, { "name": "51766", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51766" }, { "name": "78679", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/78679" }, { "name": "RHSA-2012:0519", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html" }, { "name": "50084", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50084" }, { "name": "RHSA-2014:0371", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html" }, { "name": "RHSA-2012:1057", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html" }, { "name": "resteasy-xml-info-disclosure(72808)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808" }, { "name": "48954", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48954" }, { "name": "RHSA-2012:0441", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html" }, { "name": "47832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47832" }, { "name": "57719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57719" }, { "name": "57716", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57716" }, { "name": "47818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47818" }, { "name": "RHSA-2014:0372", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html" }, { "name": "48697", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48697" }, { "name": "RHSA-2012:1125", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "name": "RHSA-2012:1059", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html" }, { "name": "51748", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51748" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.jboss.org/browse/RESTEASY-637" }, { "name": "RHSA-2012:1056", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html" }, { "name": "RHSA-2012:1058", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html" }, { "name": "51766", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51766" }, { "name": "78679", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/78679" }, { "name": "RHSA-2012:0519", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html" }, { "name": "50084", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50084" }, { "name": "RHSA-2014:0371", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html" }, { "name": "RHSA-2012:1057", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html" }, { "name": "resteasy-xml-info-disclosure(72808)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808" }, { "name": "48954", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48954" }, { "name": "RHSA-2012:0441", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html" }, { "name": "47832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47832" }, { "name": "57719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57719" }, { "name": "57716", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57716" }, { "name": "47818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47818" }, { "name": "RHSA-2014:0372", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html" }, { "name": "48697", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48697" }, { "name": "RHSA-2012:1125", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0818", "datePublished": "2012-11-23T20:00:00", "dateReserved": "2012-01-19T00:00:00", "dateUpdated": "2024-08-06T18:38:14.782Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-0818\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-11-23T20:55:02.320\",\"lastModified\":\"2024-11-21T01:35:46.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.\"},{\"lang\":\"es\",\"value\":\"RESTEasy anterior a v2.3.1 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de una referencia de entidad externa en un documento DOM, tambi\u00e9n conocido como un ataque de inyecci\u00f3n XML de entidad externa (XXE)\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.0\",\"matchCriteriaId\":\"1B9CAFED-9068-40C0-BD72-72D01F433DB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02480F00-302E-49DA-9FF3-41DC8A5A5E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E0CE57-59C4-485C-87DB-CD5E3EDFBFC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D332D87E-6270-4DC6-8EC2-8053890DA545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A15B5C-0538-4C1E-99FC-E4620D4157BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC38C8FE-62D3-4FC6-8BF0-6437A1FC9F26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B945333E-1B4E-4B60-B060-1186B8AC2527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75F5EC0-639A-40D3-871D-1FA38BF1A37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22F557EA-05E8-4773-BB81-C0EBFE89C61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB842B8-6D95-484F-AE07-9C97BFD161D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC3D6E8C-E691-404C-9647-3ABFBF66FCDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"715FCD38-C218-45AB-824A-0EA7908BA951\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45635C9A-7AA2-42E0-95CC-C1DEC0AF60BC\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0441.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0519.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1056.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1057.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1058.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1059.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1125.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0371.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0372.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/47818\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47832\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48697\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48954\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/50084\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57716\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57719\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/78679\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/51748\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/51766\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=785631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/72808\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.jboss.org/browse/RESTEASY-637\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0441.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0519.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1057.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1125.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0371.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0372.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/47818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47832\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48954\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/50084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/78679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/51748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/51766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=785631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/72808\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.jboss.org/browse/RESTEASY-637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}" } }
rhsa-2013_1263
Vulnerability from csaf_redhat
Published
2013-09-16 03:07
Modified
2024-11-14 11:32
Summary
Red Hat Security Advisory: Red Hat Storage Console 2.1 security update
Notes
Topic
Updated Red Hat Storage Console packages that fix one security issue,
various bugs, and add enhancements are now available for Red Hat Storage
Server 2.1.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Storage Console (RHS-C) is a powerful and simple web based
Graphical User Interface for managing a Red Hat Storage 2.1 environment.
This feature is provided as a Technology Preview, and is currently not
supported under Red Hat Storage subscription services. Refer to the
following for more information about Technology Previews:
https://access.redhat.com/support/offerings/techpreview/
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker who is able to access the Red Hat Storage
Console REST API submitted a request containing an external XML entity
to a RESTEasy endpoint, the entity would be resolved, allowing the
attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
This update also fixes the following bugs:
* A new server could not be added to a cluster if the required packages
were not installed on the server. Now, the administrator can add a server
to a cluster which will automatically install the required packages, if
missing. (BZ#850431)
* Previously, the rhs-log-collector tool did not collect GlusterFS related
logs. (BZ#855271)
* Previously, it was not possible for rhsc-setup to complete successfully
on systems that have SELinux in disabled mode. (BZ#841342)
* The 'Add Brick' button in the 'Add Bricks' pop up is now placed next to
the 'Brick Directory' field for a better UI experience. (BZ#863929)
* The UUID of the volume was not visible. Now, a new field is added to the
'Summary' sub-tab of the 'Volumes' tab to display the UUIDs. (BZ#887806)
* The web console was not accessible after a server reboot. The setup
mechanism has been modified to ensure the web console is accessible after a
server reboot. (BZ#838284)
This update also adds the following enhancements:
* Previously, to import an existing storage cluster into the Red Hat
Storage Console the hosts were added one by one. Now, a new feature has
been added that allows users to import an existing storage cluster. The new
Cluster Creation window has an option to import an existing storage
cluster. If IP_Address or the hostname and password of one of the hosts of
the cluster is entered, a list containing all the hosts of the cluster is
displayed and the same can be added to the Console. The volumes which are
part of the cluster also get imported. (BZ#850438)
* The command line was required to enable a volume to use CIFS. Now, you
can enable or disable the export of a volume with the new 'CIFS' checkbox
in the 'Create Volume' window. (BZ#850452)
* The new Red Hat Support plug-in for Red Hat Storage is a Technology
Preview feature that offers seamless, integrated access to the Red Hat
subscription services from the Red Hat Customer Portal. Subscribers who
install this plug-in can access these features:
- Create, manage, and update the Red Hat support cases.
- Conveniently access exclusive Red Hat knowledge and solutions.
- Search error codes, messages, etc. and view related knowledge from the
Red Hat Customer Portal. (BZ#999245)
* A new 'Event ID' column is added to the 'Events' table in the 'Advanced
View' of 'Events' tab which allows users to see the ID of each event in the
'Events' tab. (BZ#889942)
* A new feature is added to manage and monitor the hooks on the Console. It
also reports changes in the hooks and checks for new hook scripts by
polling at regular intervals. (BZ#850483)
* A new 'Optimize for Virt Store' option is added to optimize a volume to
use it as a virt store. The system sets the "virt" group option on the
volume and also the following two volume options:
- storage.owner-uid=36
- storage.owner-gid=36
This option is available during volume creation and also for existing
volumes. (BZ#891493, BZ#891491)
All users of Red Hat Storage Server 2.1 are advised to upgrade to these
updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Red Hat Storage Console packages that fix one security issue,\nvarious bugs, and add enhancements are now available for Red Hat Storage\nServer 2.1.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Storage Console (RHS-C) is a powerful and simple web based\nGraphical User Interface for managing a Red Hat Storage 2.1 environment.\nThis feature is provided as a Technology Preview, and is currently not\nsupported under Red Hat Storage subscription services. Refer to the\nfollowing for more information about Technology Previews:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat Storage\nConsole REST API submitted a request containing an external XML entity\nto a RESTEasy endpoint, the entity would be resolved, allowing the\nattacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs:\n\n* A new server could not be added to a cluster if the required packages\nwere not installed on the server. Now, the administrator can add a server\nto a cluster which will automatically install the required packages, if\nmissing. (BZ#850431)\n\n* Previously, the rhs-log-collector tool did not collect GlusterFS related\nlogs. (BZ#855271)\n\n* Previously, it was not possible for rhsc-setup to complete successfully\non systems that have SELinux in disabled mode. (BZ#841342)\n\n* The \u0027Add Brick\u0027 button in the \u0027Add Bricks\u0027 pop up is now placed next to\nthe \u0027Brick Directory\u0027 field for a better UI experience. (BZ#863929)\n\n* The UUID of the volume was not visible. Now, a new field is added to the\n\u0027Summary\u0027 sub-tab of the \u0027Volumes\u0027 tab to display the UUIDs. (BZ#887806)\n\n* The web console was not accessible after a server reboot. The setup\nmechanism has been modified to ensure the web console is accessible after a\nserver reboot. (BZ#838284)\n\nThis update also adds the following enhancements:\n\n* Previously, to import an existing storage cluster into the Red Hat\nStorage Console the hosts were added one by one. Now, a new feature has\nbeen added that allows users to import an existing storage cluster. The new\nCluster Creation window has an option to import an existing storage\ncluster. If IP_Address or the hostname and password of one of the hosts of\nthe cluster is entered, a list containing all the hosts of the cluster is\ndisplayed and the same can be added to the Console. The volumes which are\npart of the cluster also get imported. (BZ#850438)\n\n* The command line was required to enable a volume to use CIFS. Now, you\ncan enable or disable the export of a volume with the new \u0027CIFS\u0027 checkbox\nin the \u0027Create Volume\u0027 window. (BZ#850452)\n\n* The new Red Hat Support plug-in for Red Hat Storage is a Technology\nPreview feature that offers seamless, integrated access to the Red Hat\nsubscription services from the Red Hat Customer Portal. Subscribers who\ninstall this plug-in can access these features:\n\n- Create, manage, and update the Red Hat support cases.\n- Conveniently access exclusive Red Hat knowledge and solutions.\n- Search error codes, messages, etc. and view related knowledge from the\nRed Hat Customer Portal. (BZ#999245)\n\n* A new \u0027Event ID\u0027 column is added to the \u0027Events\u0027 table in the \u0027Advanced\nView\u0027 of \u0027Events\u0027 tab which allows users to see the ID of each event in the\n\u0027Events\u0027 tab. (BZ#889942)\n\n* A new feature is added to manage and monitor the hooks on the Console. It\nalso reports changes in the hooks and checks for new hook scripts by\npolling at regular intervals. (BZ#850483)\n\n* A new \u0027Optimize for Virt Store\u0027 option is added to optimize a volume to\nuse it as a virt store. The system sets the \"virt\" group option on the\nvolume and also the following two volume options:\n\n- storage.owner-uid=36\n- storage.owner-gid=36\n\nThis option is available during volume creation and also for existing\nvolumes. (BZ#891493, BZ#891491)\n\nAll users of Red Hat Storage Server 2.1 are advised to upgrade to these\nupdated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1263", "url": "https://access.redhat.com/errata/RHSA-2013:1263" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/support/offerings/techpreview/", "url": "https://access.redhat.com/support/offerings/techpreview/" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "855271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855271" }, { "category": "external", "summary": "863929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863929" }, { "category": "external", "summary": "887806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=887806" }, { "category": "external", "summary": "889942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889942" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1263.json" } ], "title": "Red Hat Security Advisory: Red Hat Storage Console 2.1 security update", "tracking": { "current_release_date": "2024-11-14T11:32:23+00:00", "generator": { "date": "2024-11-14T11:32:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2013:1263", "initial_release_date": "2013-09-16T03:07:00+00:00", "revision_history": [ { "date": "2013-09-16T03:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-09-16T03:08:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:32:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Storage Console 2.1", "product": { "name": "Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:2.1:console:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "python-ply-0:3.3-7.el6ev.noarch", "product": { "name": "python-ply-0:3.3-7.el6ev.noarch", "product_id": "python-ply-0:3.3-7.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ply@3.3-7.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "python-daemon-0:1.5.2-1.el6.noarch", "product": { "name": "python-daemon-0:1.5.2-1.el6.noarch", "product_id": "python-daemon-0:1.5.2-1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-daemon@1.5.2-1.el6?arch=noarch" } } }, { "category": "product_version", "name": "python-kitchen-0:1.1.1-2.el6ev.noarch", "product": { "name": "python-kitchen-0:1.1.1-2.el6ev.noarch", "product_id": "python-kitchen-0:1.1.1-2.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kitchen@1.1.1-2.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_id": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-sdk@2.1.0.0-0.bb3a.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_id": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-cli@2.1.0.0-0.bb3a.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "product": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "product_id": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-log-collector@2.1-0.1.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-lockfile-0:0.8-5.el6.noarch", "product": { "name": "python-lockfile-0:0.8-5.el6.noarch", "product_id": "python-lockfile-0:0.8-5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-lockfile@0.8-5.el6?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-webadmin-portal@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-tools@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-restapi@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-backend@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-dbscripts@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-setup@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi-repolib@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "otopi-devel-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-devel-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-devel-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi-devel@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "otopi-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "otopi-java-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-java-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-java-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi-java@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "product": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "product_id": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "product": { "name": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "product_id": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy-java@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "product": { "name": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "product_id": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy-repolib@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "product": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "product_id": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-access-plugin-storage@2.1.0-0.el6rhs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-ply-0:3.3-7.el6ev.src", "product": { "name": "python-ply-0:3.3-7.el6ev.src", "product_id": "python-ply-0:3.3-7.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ply@3.3-7.el6ev?arch=src" } } }, { "category": "product_version", "name": "python-daemon-0:1.5.2-1.el6.src", "product": { "name": "python-daemon-0:1.5.2-1.el6.src", "product_id": "python-daemon-0:1.5.2-1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-daemon@1.5.2-1.el6?arch=src" } } }, { "category": "product_version", "name": "python-kitchen-0:1.1.1-2.el6ev.src", "product": { "name": "python-kitchen-0:1.1.1-2.el6ev.src", "product_id": "python-kitchen-0:1.1.1-2.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kitchen@1.1.1-2.el6ev?arch=src" } } }, { "category": "product_version", "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "product": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "product_id": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-sdk@2.1.0.0-0.bb3a.el6rhs?arch=src" } } }, { "category": "product_version", "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "product": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "product_id": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-cli@2.1.0.0-0.bb3a.el6rhs?arch=src" } } }, { "category": "product_version", "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "product": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "product_id": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-log-collector@2.1-0.1.el6rhs?arch=src" } } }, { "category": "product_version", "name": "python-lockfile-0:0.8-5.el6.src", "product": { "name": "python-lockfile-0:0.8-5.el6.src", "product_id": "python-lockfile-0:0.8-5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-lockfile@0.8-5.el6?arch=src" } } }, { "category": "product_version", "name": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "product": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "product_id": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc@2.1.0-0.bb10.el6rhs?arch=src" } } }, { "category": "product_version", "name": "otopi-0:1.1.0-1.el6ev.src", "product": { "name": "otopi-0:1.1.0-1.el6ev.src", "product_id": "otopi-0:1.1.0-1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi@1.1.0-1.el6ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "product": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "product_id": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy@1.1.0-1.el6ev?arch=src" } } }, { "category": "product_version", "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "product": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "product_id": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-access-plugin-storage@2.1.0-0.el6rhs?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "otopi-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-0:1.1.0-1.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src" }, "product_reference": "otopi-0:1.1.0-1.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-devel-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-devel-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-java-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-java-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-repolib-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch" }, "product_reference": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src" }, "product_reference": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch" }, "product_reference": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch" }, "product_reference": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-daemon-0:1.5.2-1.el6.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch" }, "product_reference": "python-daemon-0:1.5.2-1.el6.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-daemon-0:1.5.2-1.el6.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src" }, "product_reference": "python-daemon-0:1.5.2-1.el6.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-kitchen-0:1.1.1-2.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch" }, "product_reference": "python-kitchen-0:1.1.1-2.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-kitchen-0:1.1.1-2.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src" }, "product_reference": "python-kitchen-0:1.1.1-2.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-lockfile-0:0.8-5.el6.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch" }, "product_reference": "python-lockfile-0:0.8-5.el6.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-lockfile-0:0.8-5.el6.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src" }, "product_reference": "python-lockfile-0:0.8-5.el6.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-ply-0:3.3-7.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch" }, "product_reference": "python-ply-0:3.3-7.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-ply-0:3.3-7.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src" }, "product_reference": "python-ply-0:3.3-7.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch" }, "product_reference": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src" }, "product_reference": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src" }, "product_reference": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch" }, "product_reference": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src" }, "product_reference": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch" }, "product_reference": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src" }, "product_reference": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch" }, "product_reference": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src" }, "product_reference": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src", "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src", "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-09-16T03:07:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src", "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src", "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1263" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src", "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src", "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
rhsa-2012_0519
Vulnerability from csaf_redhat
Published
2012-04-25 02:03
Modified
2024-12-15 18:19
Summary
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.1 update
Notes
Topic
JBoss Enterprise Portal Platform 5.2.1, which fixes two security issues
and various bugs, is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
JBoss Enterprise Portal Platform is the open source implementation of the
Java EE suite of services and Portal services running atop JBoss Enterprise
Application Platform. It comprises a set of offerings for enterprise
customers who are looking for pre-configured profiles of JBoss Enterprise
Middleware components that have been tested and certified together to
provide an integrated experience.
This release of JBoss Enterprise Portal Platform 5.2.1 serves as a
replacement for JBoss Enterprise Portal Platform 5.2.0, and includes bug
fixes. Refer to the JBoss Enterprise Portal Platform 5.2.1 Release Notes
for information on the most significant of these changes. The Release Notes
will be available shortly from
https://docs.redhat.com/docs/en-US/index.html
The following security issues are also fixed with this release:
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)
Warning: Before applying this update, back up all applications deployed on
JBoss Enterprise Portal Platform, along with all customized configuration
files.
All users of JBoss Enterprise Portal Platform 5.2.0 as provided from the
Red Hat Customer Portal are advised to upgrade to JBoss Enterprise Portal
Platform 5.2.1.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Enterprise Portal Platform 5.2.1, which fixes two security issues\nand various bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Portal Platform is the open source implementation of the\nJava EE suite of services and Portal services running atop JBoss Enterprise\nApplication Platform. It comprises a set of offerings for enterprise\ncustomers who are looking for pre-configured profiles of JBoss Enterprise\nMiddleware components that have been tested and certified together to\nprovide an integrated experience.\n\nThis release of JBoss Enterprise Portal Platform 5.2.1 serves as a\nreplacement for JBoss Enterprise Portal Platform 5.2.0, and includes bug\nfixes. Refer to the JBoss Enterprise Portal Platform 5.2.1 Release Notes\nfor information on the most significant of these changes. The Release Notes\nwill be available shortly from\nhttps://docs.redhat.com/docs/en-US/index.html\n\nThe following security issues are also fixed with this release:\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nIt was found that the Attribute Exchange (AX) extension of OpenID4Java was\nnot checking to ensure attributes were signed. If AX was being used to\nreceive information that an application only trusts the identity provider\nto assert, a remote attacker could use this flaw to conduct\nman-in-the-middle attacks and compromise the integrity of the information\nvia a specially-crafted request. By default, only the JBoss Seam openid\nexample application uses OpenID4Java. (CVE-2011-4314)\n\nWarning: Before applying this update, back up all applications deployed on\nJBoss Enterprise Portal Platform, along with all customized configuration\nfiles.\n\nAll users of JBoss Enterprise Portal Platform 5.2.0 as provided from the\nRed Hat Customer Portal are advised to upgrade to JBoss Enterprise Portal\nPlatform 5.2.1.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0519", "url": "https://access.redhat.com/errata/RHSA-2012:0519" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions" }, { "category": "external", "summary": "https://docs.redhat.com/docs/en-US/index.html", "url": "https://docs.redhat.com/docs/en-US/index.html" }, { "category": "external", "summary": "754386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0519.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.1 update", "tracking": { "current_release_date": "2024-12-15T18:19:07+00:00", "generator": { "date": "2024-12-15T18:19:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2012:0519", "initial_release_date": "2012-04-25T02:03:00+00:00", "revision_history": [ { "date": "2012-04-25T02:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-25T02:10:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:19:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Portal 5.2", "product": { "name": "Red Hat JBoss Portal 5.2", "product_id": "Red Hat JBoss Portal 5.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4314", "discovery_date": "2011-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "754386" } ], "notes": [ { "category": "description", "text": "message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "extension): MITM due to improper validation of AX attribute signatures", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4314" }, { "category": "external", "summary": "RHBZ#754386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4314", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314" } ], "release_date": "2011-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-25T02:03:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0519" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "extension): MITM due to improper validation of AX attribute signatures" }, { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-25T02:03:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0519" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-25T02:03:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0519" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
rhsa-2012_1125
Vulnerability from csaf_redhat
Published
2012-07-31 14:24
Modified
2024-11-22 05:43
Summary
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update
Notes
Topic
JBoss Enterprise SOA Platform 5.3.0, which fixes multiple security issues,
various bugs, and adds enhancements, is now available from the Red Hat
Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
JBoss Enterprise SOA Platform is the next-generation ESB and business
process automation infrastructure.
This release of JBoss Enterprise SOA Platform 5.3.0 serves as a replacement
for JBoss Enterprise SOA Platform 5.2.0. It includes various bug fixes and
enhancements which are detailed in the JBoss Enterprise SOA Platform 5.3.0
Release Notes. The Release Notes will be available shortly from
https://access.redhat.com/knowledge/docs/
The following security issues are also fixed with this release:
It was found that the JBoss JNDI service allowed unauthenticated, remote
write access by default. The JNDI and HA-JNDI services, and the
HAJNDIFactory invoker servlet were all affected. A remote attacker able to
access the JNDI service (port 1099), HA-JNDI service (port 1100), or the
HAJNDIFactory invoker servlet on a JBoss server could use this flaw to add,
delete, and modify items in the JNDI tree. This could have various,
application-specific impacts. (CVE-2011-4605)
A denial of service flaw was found in the implementation of associative
arrays (hashes) in JRuby. An attacker able to supply a large number of
inputs to a JRuby application (such as HTTP POST request parameters sent to
a web application) that are used as keys when inserting data into an array
could trigger multiple hash function collisions, making array operations
take an excessive amount of CPU time. To mitigate this issue, randomization
has been added to the hash function to reduce the chance of an attacker
successfully causing intentional collisions. (CVE-2011-4838)
Note: JBoss Enterprise SOA Platform only provides JRuby as a dependency of
the scripting_chain quickstart example application. The CVE-2011-4838 flaw
is not exposed unless the version of JRuby shipped with that quickstart is
used by a deployed, custom application.
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. The fix for this issue is not
enabled by default. Refer to the Solution section for details.
(CVE-2012-0818)
Multiple flaws were found in the Oracle OpenSSO authentication and
administration components. A remote attacker could use these flaws to
affect the integrity and availability of a service that uses Oracle
OpenSSO. (CVE-2011-3506, CVE-2011-3517, CVE-2012-0079)
Note: JBoss Enterprise SOA Platform only provides Oracle OpenSSO as part of
the opensso quickstart example application. The CVE-2011-3506,
CVE-2011-3517, and CVE-2012-0079 flaws are not exposed unless the opensso
quickstart example application is deployed, or you have created and
deployed a custom application that is packaged with a copy of Oracle
OpenSSO as provided by the opensso quickstart.
The opensso quickstart has been removed in this release to address these
flaws. Users interested in continuing to receive updates for their custom
applications using Oracle OpenSSO are advised to contact Oracle as Red Hat
is no longer supporting OpenSSO.
When a JGroups channel is started, the JGroups diagnostics service would be
enabled by default with no authentication. This service is exposed via IP
multicast. An attacker on an adjacent network could exploit this flaw to
read diagnostics information. (CVE-2012-2377)
Red Hat would like to thank Christian Schlüter (VIADA) for reporting
CVE-2011-4605, and oCERT for reporting CVE-2011-4838. oCERT
acknowledges Julian Wälde and Alexander Klink as the original reporters of
CVE-2011-4838.
Warning: Before installing version 5.3.0, back up your existing JBoss
Enterprise SOA Platform installation (including its databases,
applications, configuration files, and so on).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Enterprise SOA Platform 5.3.0, which fixes multiple security issues,\nvarious bugs, and adds enhancements, is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise SOA Platform is the next-generation ESB and business\nprocess automation infrastructure.\n\nThis release of JBoss Enterprise SOA Platform 5.3.0 serves as a replacement\nfor JBoss Enterprise SOA Platform 5.2.0. It includes various bug fixes and\nenhancements which are detailed in the JBoss Enterprise SOA Platform 5.3.0\nRelease Notes. The Release Notes will be available shortly from\nhttps://access.redhat.com/knowledge/docs/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the JBoss JNDI service allowed unauthenticated, remote\nwrite access by default. The JNDI and HA-JNDI services, and the\nHAJNDIFactory invoker servlet were all affected. A remote attacker able to\naccess the JNDI service (port 1099), HA-JNDI service (port 1100), or the\nHAJNDIFactory invoker servlet on a JBoss server could use this flaw to add,\ndelete, and modify items in the JNDI tree. This could have various,\napplication-specific impacts. (CVE-2011-4605)\n\nA denial of service flaw was found in the implementation of associative\narrays (hashes) in JRuby. An attacker able to supply a large number of\ninputs to a JRuby application (such as HTTP POST request parameters sent to\na web application) that are used as keys when inserting data into an array\ncould trigger multiple hash function collisions, making array operations\ntake an excessive amount of CPU time. To mitigate this issue, randomization\nhas been added to the hash function to reduce the chance of an attacker\nsuccessfully causing intentional collisions. (CVE-2011-4838)\n\nNote: JBoss Enterprise SOA Platform only provides JRuby as a dependency of\nthe scripting_chain quickstart example application. The CVE-2011-4838 flaw\nis not exposed unless the version of JRuby shipped with that quickstart is\nused by a deployed, custom application.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. The fix for this issue is not\nenabled by default. Refer to the Solution section for details.\n(CVE-2012-0818)\n\nMultiple flaws were found in the Oracle OpenSSO authentication and\nadministration components. A remote attacker could use these flaws to\naffect the integrity and availability of a service that uses Oracle\nOpenSSO. (CVE-2011-3506, CVE-2011-3517, CVE-2012-0079)\n\nNote: JBoss Enterprise SOA Platform only provides Oracle OpenSSO as part of\nthe opensso quickstart example application. The CVE-2011-3506,\nCVE-2011-3517, and CVE-2012-0079 flaws are not exposed unless the opensso\nquickstart example application is deployed, or you have created and\ndeployed a custom application that is packaged with a copy of Oracle\nOpenSSO as provided by the opensso quickstart.\n\nThe opensso quickstart has been removed in this release to address these\nflaws. Users interested in continuing to receive updates for their custom\napplications using Oracle OpenSSO are advised to contact Oracle as Red Hat\nis no longer supporting OpenSSO.\n\nWhen a JGroups channel is started, the JGroups diagnostics service would be\nenabled by default with no authentication. This service is exposed via IP\nmulticast. An attacker on an adjacent network could exploit this flaw to\nread diagnostics information. (CVE-2012-2377)\n\nRed Hat would like to thank Christian Schl\u00fcter (VIADA) for reporting\nCVE-2011-4605, and oCERT for reporting CVE-2011-4838. oCERT\nacknowledges Julian W\u00e4lde and Alexander Klink as the original reporters of\nCVE-2011-4838.\n\nWarning: Before installing version 5.3.0, back up your existing JBoss\nEnterprise SOA Platform installation (including its databases,\napplications, configuration files, and so on).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1125", "url": "https://access.redhat.com/errata/RHSA-2012:1125" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=distributions", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=distributions" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/", "url": "https://access.redhat.com/knowledge/docs/" }, { "category": "external", "summary": "749078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749078" }, { "category": "external", "summary": "749079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749079" }, { "category": "external", "summary": "766469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766469" }, { "category": "external", "summary": "770820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770820" }, { "category": "external", "summary": "783898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783898" }, { "category": "external", "summary": "823392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823392" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1125.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update", "tracking": { "current_release_date": "2024-11-22T05:43:20+00:00", "generator": { "date": "2024-11-22T05:43:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1125", "initial_release_date": "2012-07-31T14:24:00+00:00", "revision_history": [ { "date": "2012-07-31T14:24:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-07-31T14:32:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:43:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss SOA Platform 5.3", "product": { "name": "Red Hat JBoss SOA Platform 5.3", "product_id": "Red Hat JBoss SOA Platform 5.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_soa_platform:5.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3506", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "749078" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Oracle OpenSSO component in Oracle Sun Products Suite 7.1 and 8.0 allows remote attackers to affect integrity via unknown vectors related to Authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSO: unspecified vulnerability in the authentication component", "title": "Vulnerability summary" }, { "category": "other", "text": "Oracle OpenSSO is provided as part of the opensso quickstart example application shipped with JBoss Enterprise SOA Platform 5. The CVE-2011-3506, CVE-2011-3517, and CVE-2012-0079 flaws are not exposed unless the opensso quickstart example application is deployed, or you have created and deployed a custom application that is packaged with a copy of Oracle OpenSSO as provided by the opensso quickstart.\n\nThe opensso quickstart has been removed in JBoss Enterprise SOA Platform 5.3.0 to address these flaws. Users interested in continuing to receive updates for their custom applications using Oracle OpenSSO are advised to contact Oracle as Red Hat is no longer supporting OpenSSO.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3506" }, { "category": "external", "summary": "RHBZ#749078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3506", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSO: unspecified vulnerability in the authentication component" }, { "cve": "CVE-2011-3517", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "749079" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Oracle OpenSSO component in Oracle Sun Products Suite 8.0 allows remote attackers to affect availability via unknown vectors related to Authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSO: unspecified vulnerability in the authentication component", "title": "Vulnerability summary" }, { "category": "other", "text": "Oracle OpenSSO is provided as part of the opensso quickstart example application shipped with JBoss Enterprise SOA Platform 5. The CVE-2011-3506, CVE-2011-3517, and CVE-2012-0079 flaws are not exposed unless the opensso quickstart example application is deployed, or you have created and deployed a custom application that is packaged with a copy of Oracle OpenSSO as provided by the opensso quickstart.\n\nThe opensso quickstart has been removed in JBoss Enterprise SOA Platform 5.3.0 to address these flaws. Users interested in continuing to receive updates for their custom applications using Oracle OpenSSO are advised to contact Oracle as Red Hat is no longer supporting OpenSSO.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3517" }, { "category": "external", "summary": "RHBZ#749079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749079" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3517" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSO: unspecified vulnerability in the authentication component" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "VIADA" } ], "cve": "CVE-2011-4605", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "discovery_date": "2011-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "766469" } ], "notes": [ { "category": "description", "text": "The (1) JNDI service, (2) HA-JNDI service, and (3) HAJNDIFactory invoker servlet in JBoss Enterprise Application Platform 4.3.0 CP10 and 5.1.2, Web Platform 5.1.2, SOA Platform 4.2.0.CP05 and 4.3.0.CP05, Portal Platform 4.3 CP07 and 5.2.x before 5.2.2, and BRMS Platform before 5.3.0 do not properly restrict write access, which allows remote attackers to add, delete, or modify items in a JNDI tree via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JNDI: unauthenticated remote write access is permitted by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4605" }, { "category": "external", "summary": "RHBZ#766469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4605", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4605" } ], "release_date": "2012-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JNDI: unauthenticated remote write access is permitted by default" }, { "acknowledgments": [ { "names": [ "oCERT" ] } ], "cve": "CVE-2011-4838", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "770820" } ], "notes": [ { "category": "description", "text": "JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.", "title": "Vulnerability description" }, { "category": "summary", "text": "jruby: hash table collisions DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4838" }, { "category": "external", "summary": "RHBZ#770820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770820" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4838", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4838" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jruby: hash table collisions DoS (oCERT-2011-003)" }, { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0079", "discovery_date": "2012-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "783898" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle OpenSSO 7.1 and 8.0 allows remote attackers to affect integrity via unknown vectors related to Administration.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSO: Unspecified vulnerability allows remote attackers to affect integrity via unknown vectors", "title": "Vulnerability summary" }, { "category": "other", "text": "Oracle OpenSSO is provided as part of the opensso quickstart example application shipped with JBoss Enterprise SOA Platform 5. The CVE-2011-3506, CVE-2011-3517, and CVE-2012-0079 flaws are not exposed unless the opensso quickstart example application is deployed, or you have created and deployed a custom application that is packaged with a copy of Oracle OpenSSO as provided by the opensso quickstart.\n\nThe opensso quickstart has been removed in JBoss Enterprise SOA Platform 5.3.0 to address these flaws. Users interested in continuing to receive updates for their custom applications using Oracle OpenSSO are advised to contact Oracle as Red Hat is no longer supporting OpenSSO.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0079" }, { "category": "external", "summary": "RHBZ#783898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0079", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0079" } ], "release_date": "2012-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSO: Unspecified vulnerability allows remote attackers to affect integrity via unknown vectors" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-1167", "discovery_date": "2012-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802622" } ], "notes": [ { "category": "description", "text": "The JBoss Server in JBoss Enterprise Application Platform 5.1.x before 5.1.2 and 5.2.x before 5.2.2, Web Platform before 5.1.2, BRMS Platform before 5.3.0, and SOA Platform before 5.3.0, when the server is configured to use the JaccAuthorizationRealm and the ignoreBaseDecision property is set to true on the JBossWebRealm, does not properly check the permissions created by the WebPermissionMapping class, which allows remote authenticated users to access arbitrary applications.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1167" }, { "category": "external", "summary": "RHBZ#802622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1167", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1167" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm" }, { "acknowledgments": [ { "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-2377", "discovery_date": "2012-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "823392" } ], "notes": [ { "category": "description", "text": "JGroups diagnostics service in JBoss Enterprise Portal Platform before 5.2.2, SOA Platform before 5.3.0, and BRMS Platform before 5.3.0, is enabled without authentication when started by the JGroups channel, which allows remote attackers in adjacent networks to read diagnostics information via a crafted IP multicast.", "title": "Vulnerability description" }, { "category": "summary", "text": "JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2377" }, { "category": "external", "summary": "RHBZ#823392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2377", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2377" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-31T14:24:00+00:00", "details": "All users of JBoss Enterprise SOA Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.3.0.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the new version). Before installing version 5.3.0, back\nup your existing JBoss Enterprise SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nThe fix for CVE-2012-0818 is not enabled by default. This update adds a new\nconfiguration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1125" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started" } ] }
rhsa-2012_0421
Vulnerability from csaf_redhat
Published
2012-03-26 15:16
Modified
2024-11-14 11:30
Summary
Red Hat Security Advisory: rhevm security and bug fix update
Notes
Topic
Updated rhevm packages that fix one security issue and various bugs are now
available.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise Virtualization Manager is a visual tool for centrally
managing collections of virtual machines running Red Hat Enterprise Linux
and Microsoft Windows. These packages also include the Red Hat Enterprise
Virtualization Manager REST (Representational State Transfer) API, a set of
scriptable commands that give administrators the ability to perform queries
and operations on Red Hat Enterprise Virtualization Manager.
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker who is able to access the Red Hat Enterprise
Virtualization Manager REST API submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
This update also fixes the following bugs:
* Previously the REST API was ignoring the "Accept" header. This made it
impossible to retrieve detailed information about specific sub-collections,
including hosts and disks. The REST API has been updated and now processes
the "Accept" header as originally intended. (BZ#771369)
* The "start_time" Virtual Machine property was previously always set. This
meant that even Virtual Machines that were stopped, had a value for
"start_time". An update has been made to ensure that the "start_time"
property is only set when the Virtual Machine has been started, and is
running. (BZ#772975)
* The 'rhevm-setup' script previously only ran successfully on systems with
their locale set to 'en_US.UTF-8', 'en_US.utf-8', or 'en_US.utf8'. The
script has since been updated to also run successfully in additional
locales, including 'ja_JP.UTF-8'. (BZ#784860)
* The REST API did not previously validate that all required parameters
were provided when enabling power management. The response code returned
would also incorrectly indicate the operation had succeeded where
mandatory parameters were not supplied. An update has been made to ensure
that the power management parameters are validated correctly. (BZ#785744)
* Previously no warning or error was issued when the amount of free disk
space on a host was low. When no free disk space remained on the host it
would become non-responsive with no prior warning. An update has been made
to report a warning in the audit log when a host's free disk space is less
than 1000 MB, and an error when a host's free disk space is less than 500
MB. (BZ#786132)
* When importing Virtual Machines no notification was provided if the MAC
address of the network interface card clashed with that of an existing
Virtual Machine. Now when this occurs a message is printed to the audit
log, highlighting the need for manual intervention. (BZ#795416)
* Previously it was not possible to set more, or less, than one value for
SpiceSecureChannels using the rhevm-config tool. This meant it was not
possible to encrypt all SPICE channels. The rhevm-config tool has been
updated and it is now possible to encrypt all SPICE channels, by adding
them to the SpiceSecureChannels configuration key. (BZ#784012)
All Red Hat Enterprise Virtualization users are advised to upgrade to these
updated packages, which address this vulnerability and fix these bugs.
Refer to the Solution section for information about installing this update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated rhevm packages that fix one security issue and various bugs are now\navailable.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise Virtualization Manager is a visual tool for centrally\nmanaging collections of virtual machines running Red Hat Enterprise Linux\nand Microsoft Windows. These packages also include the Red Hat Enterprise\nVirtualization Manager REST (Representational State Transfer) API, a set of\nscriptable commands that give administrators the ability to perform queries\nand operations on Red Hat Enterprise Virtualization Manager.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat Enterprise\nVirtualization Manager REST API submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs:\n\n* Previously the REST API was ignoring the \"Accept\" header. This made it\nimpossible to retrieve detailed information about specific sub-collections,\nincluding hosts and disks. The REST API has been updated and now processes\nthe \"Accept\" header as originally intended. (BZ#771369)\n\n* The \"start_time\" Virtual Machine property was previously always set. This\nmeant that even Virtual Machines that were stopped, had a value for\n\"start_time\". An update has been made to ensure that the \"start_time\"\nproperty is only set when the Virtual Machine has been started, and is\nrunning. (BZ#772975)\n\n* The \u0027rhevm-setup\u0027 script previously only ran successfully on systems with\ntheir locale set to \u0027en_US.UTF-8\u0027, \u0027en_US.utf-8\u0027, or \u0027en_US.utf8\u0027. The\nscript has since been updated to also run successfully in additional\nlocales, including \u0027ja_JP.UTF-8\u0027. (BZ#784860)\n\n* The REST API did not previously validate that all required parameters\nwere provided when enabling power management. The response code returned\nwould also incorrectly indicate the operation had succeeded where\nmandatory parameters were not supplied. An update has been made to ensure\nthat the power management parameters are validated correctly. (BZ#785744)\n\n* Previously no warning or error was issued when the amount of free disk\nspace on a host was low. When no free disk space remained on the host it\nwould become non-responsive with no prior warning. An update has been made\nto report a warning in the audit log when a host\u0027s free disk space is less\nthan 1000 MB, and an error when a host\u0027s free disk space is less than 500\nMB. (BZ#786132)\n\n* When importing Virtual Machines no notification was provided if the MAC\naddress of the network interface card clashed with that of an existing\nVirtual Machine. Now when this occurs a message is printed to the audit\nlog, highlighting the need for manual intervention. (BZ#795416)\n\n* Previously it was not possible to set more, or less, than one value for\nSpiceSecureChannels using the rhevm-config tool. This meant it was not\npossible to encrypt all SPICE channels. The rhevm-config tool has been\nupdated and it is now possible to encrypt all SPICE channels, by adding\nthem to the SpiceSecureChannels configuration key. (BZ#784012)\n\nAll Red Hat Enterprise Virtualization users are advised to upgrade to these\nupdated packages, which address this vulnerability and fix these bugs.\nRefer to the Solution section for information about installing this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0421", "url": "https://access.redhat.com/errata/RHSA-2012:0421" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0421.json" } ], "title": "Red Hat Security Advisory: rhevm security and bug fix update", "tracking": { "current_release_date": "2024-11-14T11:30:41+00:00", "generator": { "date": "2024-11-14T11:30:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0421", "initial_release_date": "2012-03-26T15:16:00+00:00", "revision_history": [ { "date": "2012-03-26T15:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-03-26T15:17:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV-M for Servers", "product": { "name": "RHEV-M for Servers", "product_id": "6Server-RHEV-S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:3" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-notification-service@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-log-collector@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-iso-uploader@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-genericapi@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-restapi@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-debuginfo@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-jboss-deps@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-webadmin-portal@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-backend@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-dbscripts@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-setup@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-config-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-config-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-config-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-config@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-userportal@3.0.3_0001-3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "product": { "name": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "product_id": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm-tools-common@3.0.3_0001-3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rhevm-0:3.0.3_0001-3.el6.src", "product": { "name": "rhevm-0:3.0.3_0001-3.el6.src", "product_id": "rhevm-0:3.0.3_0001-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhevm@3.0.3_0001-3.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhevm-0:3.0.3_0001-3.el6.src as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src" }, "product_reference": "rhevm-0:3.0.3_0001-3.el6.src", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-config-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-config-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64 as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64" }, "product_reference": "rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64", "relates_to_product_reference": "6Server-RHEV-S" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src", "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-03-26T15:16:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Follow the upgrade\nprocedure in the Red Hat Enterprise Virtualization\nInstallation Guide to install these updated packages:\n\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html", "product_ids": [ "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src", "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0421" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src", "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src", "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-03-26T15:16:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Follow the upgrade\nprocedure in the Red Hat Enterprise Virtualization\nInstallation Guide to install these updated packages:\n\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Installation_Guide/chap-Installation_Guide-Installing_the_RHEV_Manager-Upgrades.html", "product_ids": [ "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src", "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0421" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.src", "6Server-RHEV-S:rhevm-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-backend-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-config-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-dbscripts-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-debuginfo-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-genericapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-iso-uploader-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-jboss-deps-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-log-collector-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-notification-service-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-restapi-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-setup-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-tools-common-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-userportal-0:3.0.3_0001-3.el6.x86_64", "6Server-RHEV-S:rhevm-webadmin-portal-0:3.0.3_0001-3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
rhsa-2012_1056
Vulnerability from csaf_redhat
Published
2012-07-05 19:19
Modified
2024-11-14 11:31
Summary
Red Hat Security Advisory: resteasy security update
Notes
Topic
An update for JBoss Enterprise Application Platform 5.1.2 that fixes one
security issue is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
RESTEasy provides various frameworks to help you build RESTful web services
and RESTful Java applications.
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
Note: The fix for CVE-2012-0818 is not enabled by default. This update adds
a new configuration option to disable entity expansion in RESTEasy. If
applications on your server expose RESTEasy XML endpoints, a
resteasy.document.expand.entity.references configuration snippet must be
added to their web.xml file to disable entity expansion in RESTEasy. Refer
to Red Hat Bugzilla bug 785631 for details.
Warning: Before applying this update, back up your JBoss Enterprise
Application Platform's "jboss-as/server/[PROFILE]/deploy/" directory, along
with all other customized configuration files.
All users of JBoss Enterprise Application Platform 5.1.2 as provided from
the Red Hat Customer Portal are advised to install this update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for JBoss Enterprise Application Platform 5.1.2 that fixes one\nsecurity issue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform\u0027s \"jboss-as/server/[PROFILE]/deploy/\" directory, along\nwith all other customized configuration files.\n\nAll users of JBoss Enterprise Application Platform 5.1.2 as provided from\nthe Red Hat Customer Portal are advised to install this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1056", "url": "https://access.redhat.com/errata/RHSA-2012:1056" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.1.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.1.2" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1056.json" } ], "title": "Red Hat Security Advisory: resteasy security update", "tracking": { "current_release_date": "2024-11-14T11:31:18+00:00", "generator": { "date": "2024-11-14T11:31:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1056", "initial_release_date": "2012-07-05T19:19:00+00:00", "revision_history": [ { "date": "2012-07-05T19:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:45:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:31:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product_id": "Red Hat JBoss Enterprise Application Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:19:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:19:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
rhsa-2014_0371
Vulnerability from csaf_redhat
Published
2014-04-03 21:19
Modified
2024-11-22 08:11
Summary
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.1 update
Notes
Topic
Red Hat JBoss BPM Suite 6.0.1, which fixes multiple security issues,
various bugs, and adds enhancements, is now available from the Red Hat
Customer Portal.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Red Hat JBoss BPM Suite is a business rules management system for the
management, storage, creation, modification, and deployment of JBoss rules.
This release of Red Hat JBoss BPM Suite 6.0.1 serves as a replacement for
Red Hat JBoss BPM Suite 6.0.0, and includes bug fixes and enhancements.
Refer to the Red Hat JBoss BPM Suite 6.0.1 Release Notes for information on
the most significant of these changes. The Release Notes will be available
at https://access.redhat.com/site/documentation/Red_Hat_JBoss_BPM_Suite/
The following security issues are fixed with this release:
It was discovered that JBoss BPM Suite allowed remote authenticated users
to submit arbitrary Java code in MVFLEX Expression Language (MVEL) or JBoss
Rules expressions, resulting in arbitrary code execution within the
security context of the application server. Refer to the Solution section
for details on the fix for this issue. (CVE-2013-6468)
It was found that XStream could deserialize arbitrary user-supplied XML
content, representing objects of any type. A remote attacker able to pass
XML to XStream could use this flaw to perform a variety of attacks,
including remote code execution in the context of the server running the
XStream application. (CVE-2013-7285)
It was found that the Apache Camel XSLT component allowed XSL stylesheets
to call external Java methods. A remote attacker able to submit messages to
a Camel route could use this flaw to perform arbitrary remote code
execution in the context of the Camel server process. (CVE-2014-0003)
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2011-5245, CVE-2012-0818)
It was discovered that bouncycastle leaked timing information when
decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites
were used. A remote attacker could possibly use this flaw to retrieve plain
text from the encrypted packets by using a TLS/SSL server as a padding
oracle. (CVE-2013-1624)
It was found that the Apache Camel XSLT component would resolve entities in
XML messages when transforming them using an XSLT route. A remote attacker
able to submit messages to an XSLT Camel route could use this flaw to read
files accessible to the user running the application server and,
potentially, perform other more advanced XML External Entity (XXE) attacks.
(CVE-2014-0002)
The CVE-2014-0002 and CVE-2014-0003 issues were discovered by David Jorm of
the Red Hat Security Response Team, and the CVE-2013-6468 issue was
discovered by Marc Schoenefeld of the Red Hat Security Response Team.
Red Hat would like to thank Grégory Draperi for independently reporting
CVE-2013-6468.
All users of Red Hat JBoss BPM Suite 6.0.0 as provided from the Red Hat
Customer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.0.1.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.0.1, which fixes multiple security issues,\nvarious bugs, and adds enhancements, is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss rules.\n\nThis release of Red Hat JBoss BPM Suite 6.0.1 serves as a replacement for\nRed Hat JBoss BPM Suite 6.0.0, and includes bug fixes and enhancements.\nRefer to the Red Hat JBoss BPM Suite 6.0.1 Release Notes for information on\nthe most significant of these changes. The Release Notes will be available\nat https://access.redhat.com/site/documentation/Red_Hat_JBoss_BPM_Suite/\n\nThe following security issues are fixed with this release:\n\nIt was discovered that JBoss BPM Suite allowed remote authenticated users\nto submit arbitrary Java code in MVFLEX Expression Language (MVEL) or JBoss\nRules expressions, resulting in arbitrary code execution within the\nsecurity context of the application server. Refer to the Solution section\nfor details on the fix for this issue. (CVE-2013-6468)\n\nIt was found that XStream could deserialize arbitrary user-supplied XML\ncontent, representing objects of any type. A remote attacker able to pass\nXML to XStream could use this flaw to perform a variety of attacks,\nincluding remote code execution in the context of the server running the\nXStream application. (CVE-2013-7285)\n\nIt was found that the Apache Camel XSLT component allowed XSL stylesheets\nto call external Java methods. A remote attacker able to submit messages to\na Camel route could use this flaw to perform arbitrary remote code\nexecution in the context of the Camel server process. (CVE-2014-0003)\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2011-5245, CVE-2012-0818)\n\nIt was discovered that bouncycastle leaked timing information when\ndecrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL server as a padding\noracle. (CVE-2013-1624)\n\nIt was found that the Apache Camel XSLT component would resolve entities in\nXML messages when transforming them using an XSLT route. A remote attacker\nable to submit messages to an XSLT Camel route could use this flaw to read\nfiles accessible to the user running the application server and,\npotentially, perform other more advanced XML External Entity (XXE) attacks.\n(CVE-2014-0002)\n\nThe CVE-2014-0002 and CVE-2014-0003 issues were discovered by David Jorm of\nthe Red Hat Security Response Team, and the CVE-2013-6468 issue was\ndiscovered by Marc Schoenefeld of the Red Hat Security Response Team.\n\nRed Hat would like to thank Gr\u00e9gory Draperi for independently reporting\nCVE-2013-6468.\n\nAll users of Red Hat JBoss BPM Suite 6.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.0.1.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0371", "url": "https://access.redhat.com/errata/RHSA-2014:0371" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.0.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.0.1" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/Red_Hat_JBoss_BPM_Suite/", "url": "https://access.redhat.com/site/documentation/Red_Hat_JBoss_BPM_Suite/" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "908428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908428" }, { "category": "external", "summary": "1049675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049675" }, { "category": "external", "summary": "1049692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049692" }, { "category": "external", "summary": "1051261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051261" }, { "category": "external", "summary": "1051277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051277" }, { "category": "external", "summary": "1058457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0371.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.1 update", "tracking": { "current_release_date": "2024-11-22T08:11:52+00:00", "generator": { "date": "2024-11-22T08:11:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0371", "initial_release_date": "2014-04-03T21:19:56+00:00", "revision_history": [ { "date": "2014-04-03T21:19:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:32:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:11:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.0", "product": { "name": "Red Hat JBoss BPMS 6.0", "product_id": "Red Hat JBoss BPMS 6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.0" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:19:56+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BPM Suite are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0371" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:19:56+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BPM Suite are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0371" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2013-1624", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2013-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "908428" } ], "notes": [ { "category": "description", "text": "It was discovered that bouncycastle leaked timing information when decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: TLS CBC padding timing attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1624" }, { "category": "external", "summary": "RHBZ#908428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1624", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1624" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", "url": "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf" } ], "release_date": "2013-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:19:56+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BPM Suite are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0371" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bouncycastle: TLS CBC padding timing attack" }, { "acknowledgments": [ { "names": [ "Marc Schoenefeld" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Gr\u00e9gory Draperi" ] } ], "cve": "CVE-2013-6468", "discovery_date": "2013-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1051261" } ], "notes": [ { "category": "description", "text": "JBoss Drools, Red Hat JBoss BRMS before 6.0.1, and Red Hat JBoss BPM Suite before 6.0.1 allows remote authenticated users to execute arbitrary Java code via a (1) MVFLEX Expression Language (MVEL) or (2) Drools expression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Drools: Remote Java Code Execution in MVEL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6468" }, { "category": "external", "summary": "RHBZ#1051261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6468", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6468" } ], "release_date": "2014-04-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:19:56+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BPM Suite are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0371" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Drools: Remote Java Code Execution in MVEL" }, { "cve": "CVE-2013-7285", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2013-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1051277" } ], "notes": [ { "category": "description", "text": "It was found that XStream could deserialize arbitrary user-supplied XML content, representing objects of any type. A remote attacker able to pass XML to XStream could use this flaw to perform a variety of attacks, including remote code execution in the context of the server running the XStream application.", "title": "Vulnerability description" }, { "category": "summary", "text": "XStream: remote code execution due to insecure XML deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-7285" }, { "category": "external", "summary": "RHBZ#1051277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-7285", "url": "https://www.cve.org/CVERecord?id=CVE-2013-7285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285" }, { "category": "external", "summary": "http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html", "url": "http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html" }, { "category": "external", "summary": "http://xstream.codehaus.org/security.html", "url": "http://xstream.codehaus.org/security.html" }, { "category": "external", "summary": "https://securityblog.redhat.com/2014/01/23/java-deserialization-flaws-part-2-xml-deserialization/", "url": "https://securityblog.redhat.com/2014/01/23/java-deserialization-flaws-part-2-xml-deserialization/" } ], "release_date": "2013-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:19:56+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BPM Suite are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0371" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "XStream: remote code execution due to insecure XML deserialization" }, { "acknowledgments": [ { "names": [ "David Jorm" ], "organization": "Red Hat Security Response Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-0002", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2014-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1049675" } ], "notes": [ { "category": "description", "text": "The XSLT component in Apache Camel before 2.11.4 and 2.12.x before 2.12.3 allows remote attackers to read arbitrary files and possibly have other unspecified impact via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "Camel: XML eXternal Entity (XXE) flaw in XSLT component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0002" }, { "category": "external", "summary": "RHBZ#1049675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0002", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0002" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0002", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0002" }, { "category": "external", "summary": "http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc", "url": "http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc" } ], "release_date": "2014-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:19:56+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BPM Suite are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0371" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Camel: XML eXternal Entity (XXE) flaw in XSLT component" }, { "acknowledgments": [ { "names": [ "David Jorm" ], "organization": "Red Hat Security Response Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-0003", "discovery_date": "2014-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1049692" } ], "notes": [ { "category": "description", "text": "The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.", "title": "Vulnerability description" }, { "category": "summary", "text": "Camel: remote code execution via XSL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0003" }, { "category": "external", "summary": "RHBZ#1049692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049692" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0003" }, { "category": "external", "summary": "http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc", "url": "http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc" } ], "release_date": "2014-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:19:56+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BPM Suite are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0371" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Camel: remote code execution via XSL" } ] }
rhsa-2012_1059
Vulnerability from csaf_redhat
Published
2012-07-05 19:24
Modified
2024-11-14 11:31
Summary
Red Hat Security Advisory: resteasy security update
Notes
Topic
Updated resteasy packages that fix one security issue are now available for
JBoss Enterprise Application Platform 5.1.2 for Red Hat Enterprise Linux 4,
5, and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
RESTEasy provides various frameworks to help you build RESTful web services
and RESTful Java applications.
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
Note: The fix for CVE-2012-0818 is not enabled by default. This update adds
a new configuration option to disable entity expansion in RESTEasy. If
applications on your server expose RESTEasy XML endpoints, a
resteasy.document.expand.entity.references configuration snippet must be
added to their web.xml file to disable entity expansion in RESTEasy. Refer
to Red Hat Bugzilla bug 785631 for details.
Warning: Before applying this update, back up your JBoss Enterprise
Application Platform's "jboss-as/server/[PROFILE]/deploy/" directory, along
with all other customized configuration files.
Users of JBoss Enterprise Application Platform 5.1.2 on Red Hat Enterprise
Linux 4, 5, and 6 should upgrade to these updated packages, which correct
this issue. The JBoss server process must be restarted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated resteasy packages that fix one security issue are now available for\nJBoss Enterprise Application Platform 5.1.2 for Red Hat Enterprise Linux 4,\n5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform\u0027s \"jboss-as/server/[PROFILE]/deploy/\" directory, along\nwith all other customized configuration files.\n\nUsers of JBoss Enterprise Application Platform 5.1.2 on Red Hat Enterprise\nLinux 4, 5, and 6 should upgrade to these updated packages, which correct\nthis issue. The JBoss server process must be restarted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1059", "url": "https://access.redhat.com/errata/RHSA-2012:1059" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1059.json" } ], "title": "Red Hat Security Advisory: resteasy security update", "tracking": { "current_release_date": "2024-11-14T11:31:30+00:00", "generator": { "date": "2024-11-14T11:31:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1059", "initial_release_date": "2012-07-05T19:24:00+00:00", "revision_history": [ { "date": "2012-07-05T19:24:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-07-05T19:27:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:31:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-5" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:24:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1059" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:24:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1059" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEAP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEAP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
rhsa-2012_0441
Vulnerability from csaf_redhat
Published
2012-04-02 20:05
Modified
2024-12-15 18:18
Summary
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.2.0 update
Notes
Topic
JBoss Enterprise BRMS Platform 5.2.0 roll up patch 1, which fixes two
security issues, various bugs, and adds enhancements, is now available from
the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
JBoss Enterprise BRMS Platform is a business rules management system for
the management, storage, creation, modification, and deployment of JBoss
Rules.
This roll up patch serves as a cumulative upgrade for JBoss Enterprise BRMS
Platform 5.2.0. It includes various bug fixes and enhancements. The
following security issues are also fixed with this release:
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)
Warning: Before applying the update, back up your existing JBoss Enterprise
BRMS Platform installation (including its databases, applications,
configuration files, and so on).
All users of JBoss Enterprise BRMS Platform 5.2.0 as provided from the Red
Hat Customer Portal are advised to apply this roll up patch.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Enterprise BRMS Platform 5.2.0 roll up patch 1, which fixes two\nsecurity issues, various bugs, and adds enhancements, is now available from\nthe Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise BRMS Platform is a business rules management system for\nthe management, storage, creation, modification, and deployment of JBoss\nRules.\n\nThis roll up patch serves as a cumulative upgrade for JBoss Enterprise BRMS\nPlatform 5.2.0. It includes various bug fixes and enhancements. The\nfollowing security issues are also fixed with this release:\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nIt was found that the Attribute Exchange (AX) extension of OpenID4Java was\nnot checking to ensure attributes were signed. If AX was being used to\nreceive information that an application only trusts the identity provider\nto assert, a remote attacker could use this flaw to conduct\nman-in-the-middle attacks and compromise the integrity of the information\nvia a specially-crafted request. By default, only the JBoss Seam openid\nexample application uses OpenID4Java. (CVE-2011-4314)\n\nWarning: Before applying the update, back up your existing JBoss Enterprise\nBRMS Platform installation (including its databases, applications,\nconfiguration files, and so on).\n\nAll users of JBoss Enterprise BRMS Platform 5.2.0 as provided from the Red\nHat Customer Portal are advised to apply this roll up patch.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0441", "url": "https://access.redhat.com/errata/RHSA-2012:0441" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.2.0" }, { "category": "external", "summary": "754386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0441.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.2.0 update", "tracking": { "current_release_date": "2024-12-15T18:18:52+00:00", "generator": { "date": "2024-12-15T18:18:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2012:0441", "initial_release_date": "2012-04-02T20:05:00+00:00", "revision_history": [ { "date": "2012-04-02T20:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-02T19:30:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:18:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "JBoss Enterprise BRMS Platform 5.2", "product": { "name": "JBoss Enterprise BRMS Platform 5.2", "product_id": "JBoss Enterprise BRMS Platform 5.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:5.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4314", "discovery_date": "2011-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "754386" } ], "notes": [ { "category": "description", "text": "message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "extension): MITM due to improper validation of AX attribute signatures", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "JBoss Enterprise BRMS Platform 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4314" }, { "category": "external", "summary": "RHBZ#754386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4314", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314" } ], "release_date": "2011-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-02T20:05:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise BRMS Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the JBoss Enterprise BRMS Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the JBoss\nEnterprise BRMS Platform server by starting the JBoss Application Server\nprocess.", "product_ids": [ "JBoss Enterprise BRMS Platform 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0441" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "JBoss Enterprise BRMS Platform 5.2" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "extension): MITM due to improper validation of AX attribute signatures" }, { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "JBoss Enterprise BRMS Platform 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-02T20:05:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise BRMS Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the JBoss Enterprise BRMS Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the JBoss\nEnterprise BRMS Platform server by starting the JBoss Application Server\nprocess.", "product_ids": [ "JBoss Enterprise BRMS Platform 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0441" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "JBoss Enterprise BRMS Platform 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "JBoss Enterprise BRMS Platform 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-02T20:05:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise BRMS Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the JBoss Enterprise BRMS Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the JBoss\nEnterprise BRMS Platform server by starting the JBoss Application Server\nprocess.", "product_ids": [ "JBoss Enterprise BRMS Platform 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0441" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "JBoss Enterprise BRMS Platform 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
rhsa-2014_0372
Vulnerability from csaf_redhat
Published
2014-04-03 21:30
Modified
2024-11-22 08:11
Summary
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.1 update
Notes
Topic
Red Hat JBoss BRMS 6.0.1, which fixes multiple security issues, various
bugs, and adds enhancements, is now available from the Red Hat Customer
Portal.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Red Hat JBoss BRMS is a business rules management system for the
management, storage, creation, modification, and deployment of JBoss Rules.
This release of Red Hat JBoss BRMS 6.0.1 serves as a replacement for Red
Hat JBoss BRMS 6.0.0, and includes bug fixes and enhancements. Refer to the
Red Hat JBoss BRMS 6.0.1 Release Notes for information on the most
significant of these changes. The Release Notes will be available shortly
at https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/
The following security issues are fixed with this release:
It was discovered that JBoss BRMS allowed remote authenticated users to
submit arbitrary Java code in MVFLEX Expression Language (MVEL) or JBoss
Rules expressions, resulting in arbitrary code execution within the
security context of the application server. Refer to the Solution section
for details on the fix for this issue. (CVE-2013-6468)
It was found that XStream could deserialize arbitrary user-supplied XML
content, representing objects of any type. A remote attacker able to pass
XML to XStream could use this flaw to perform a variety of attacks,
including remote code execution in the context of the server running the
XStream application. (CVE-2013-7285)
It was found that the Apache Camel XSLT component allowed XSL stylesheets
to call external Java methods. A remote attacker able to submit messages to
a Camel route could use this flaw to perform arbitrary remote code
execution in the context of the Camel server process. (CVE-2014-0003)
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2011-5245, CVE-2012-0818)
It was discovered that bouncycastle leaked timing information when
decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites
were used. A remote attacker could possibly use this flaw to retrieve plain
text from the encrypted packets by using a TLS/SSL server as a padding
oracle. (CVE-2013-1624)
It was found that the Apache Camel XSLT component would resolve entities in
XML messages when transforming them using an XSLT route. A remote attacker
able to submit messages to an XSLT Camel route could use this flaw to read
files accessible to the user running the application server and,
potentially, perform other more advanced XML External Entity (XXE) attacks.
(CVE-2014-0002)
The CVE-2014-0002 and CVE-2014-0003 issues were discovered by David Jorm of
the Red Hat Security Response Team, and the CVE-2013-6468 issue was
discovered by Marc Schoenefeld of the Red Hat Security Response Team.
Red Hat would like to thank Grégory Draperi for independently reporting
CVE-2013-6468.
All users of Red Hat JBoss BRMS 6.0.0 as provided from the Red Hat Customer
Portal are advised to upgrade to Red Hat JBoss BRMS 6.0.1.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.0.1, which fixes multiple security issues, various\nbugs, and adds enhancements, is now available from the Red Hat Customer\nPortal.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.0.1 serves as a replacement for Red\nHat JBoss BRMS 6.0.0, and includes bug fixes and enhancements. Refer to the\nRed Hat JBoss BRMS 6.0.1 Release Notes for information on the most\nsignificant of these changes. The Release Notes will be available shortly\nat https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/\n\nThe following security issues are fixed with this release:\n\nIt was discovered that JBoss BRMS allowed remote authenticated users to\nsubmit arbitrary Java code in MVFLEX Expression Language (MVEL) or JBoss\nRules expressions, resulting in arbitrary code execution within the\nsecurity context of the application server. Refer to the Solution section\nfor details on the fix for this issue. (CVE-2013-6468)\n\nIt was found that XStream could deserialize arbitrary user-supplied XML\ncontent, representing objects of any type. A remote attacker able to pass\nXML to XStream could use this flaw to perform a variety of attacks,\nincluding remote code execution in the context of the server running the\nXStream application. (CVE-2013-7285)\n\nIt was found that the Apache Camel XSLT component allowed XSL stylesheets\nto call external Java methods. A remote attacker able to submit messages to\na Camel route could use this flaw to perform arbitrary remote code\nexecution in the context of the Camel server process. (CVE-2014-0003)\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2011-5245, CVE-2012-0818)\n\nIt was discovered that bouncycastle leaked timing information when\ndecrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL server as a padding\noracle. (CVE-2013-1624)\n\nIt was found that the Apache Camel XSLT component would resolve entities in\nXML messages when transforming them using an XSLT route. A remote attacker\nable to submit messages to an XSLT Camel route could use this flaw to read\nfiles accessible to the user running the application server and,\npotentially, perform other more advanced XML External Entity (XXE) attacks.\n(CVE-2014-0002)\n\nThe CVE-2014-0002 and CVE-2014-0003 issues were discovered by David Jorm of\nthe Red Hat Security Response Team, and the CVE-2013-6468 issue was\ndiscovered by Marc Schoenefeld of the Red Hat Security Response Team.\n\nRed Hat would like to thank Gr\u00e9gory Draperi for independently reporting\nCVE-2013-6468.\n\nAll users of Red Hat JBoss BRMS 6.0.0 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.0.1.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0372", "url": "https://access.redhat.com/errata/RHSA-2014:0372" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.0.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.0.1" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "908428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908428" }, { "category": "external", "summary": "1049675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049675" }, { "category": "external", "summary": "1049692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049692" }, { "category": "external", "summary": "1051261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051261" }, { "category": "external", "summary": "1051277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051277" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0372.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.1 update", "tracking": { "current_release_date": "2024-11-22T08:11:47+00:00", "generator": { "date": "2024-11-22T08:11:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0372", "initial_release_date": "2014-04-03T21:30:03+00:00", "revision_history": [ { "date": "2014-04-03T21:30:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:32:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:11:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.0", "product": { "name": "Red Hat JBoss BRMS 6.0", "product_id": "Red Hat JBoss BRMS 6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.0" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:30:03+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BRMS are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BRMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:30:03+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BRMS are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BRMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2013-1624", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2013-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "908428" } ], "notes": [ { "category": "description", "text": "It was discovered that bouncycastle leaked timing information when decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: TLS CBC padding timing attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1624" }, { "category": "external", "summary": "RHBZ#908428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1624", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1624" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", "url": "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf" } ], "release_date": "2013-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:30:03+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BRMS are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BRMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bouncycastle: TLS CBC padding timing attack" }, { "acknowledgments": [ { "names": [ "Marc Schoenefeld" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Gr\u00e9gory Draperi" ] } ], "cve": "CVE-2013-6468", "discovery_date": "2013-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1051261" } ], "notes": [ { "category": "description", "text": "JBoss Drools, Red Hat JBoss BRMS before 6.0.1, and Red Hat JBoss BPM Suite before 6.0.1 allows remote authenticated users to execute arbitrary Java code via a (1) MVFLEX Expression Language (MVEL) or (2) Drools expression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Drools: Remote Java Code Execution in MVEL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6468" }, { "category": "external", "summary": "RHBZ#1051261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6468", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6468" } ], "release_date": "2014-04-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:30:03+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BRMS are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BRMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Drools: Remote Java Code Execution in MVEL" }, { "cve": "CVE-2013-7285", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2013-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1051277" } ], "notes": [ { "category": "description", "text": "It was found that XStream could deserialize arbitrary user-supplied XML content, representing objects of any type. A remote attacker able to pass XML to XStream could use this flaw to perform a variety of attacks, including remote code execution in the context of the server running the XStream application.", "title": "Vulnerability description" }, { "category": "summary", "text": "XStream: remote code execution due to insecure XML deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-7285" }, { "category": "external", "summary": "RHBZ#1051277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-7285", "url": "https://www.cve.org/CVERecord?id=CVE-2013-7285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285" }, { "category": "external", "summary": "http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html", "url": "http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html" }, { "category": "external", "summary": "http://xstream.codehaus.org/security.html", "url": "http://xstream.codehaus.org/security.html" }, { "category": "external", "summary": "https://securityblog.redhat.com/2014/01/23/java-deserialization-flaws-part-2-xml-deserialization/", "url": "https://securityblog.redhat.com/2014/01/23/java-deserialization-flaws-part-2-xml-deserialization/" } ], "release_date": "2013-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:30:03+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BRMS are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BRMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "XStream: remote code execution due to insecure XML deserialization" }, { "acknowledgments": [ { "names": [ "David Jorm" ], "organization": "Red Hat Security Response Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-0002", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2014-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1049675" } ], "notes": [ { "category": "description", "text": "The XSLT component in Apache Camel before 2.11.4 and 2.12.x before 2.12.3 allows remote attackers to read arbitrary files and possibly have other unspecified impact via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "Camel: XML eXternal Entity (XXE) flaw in XSLT component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0002" }, { "category": "external", "summary": "RHBZ#1049675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0002", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0002" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0002", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0002" }, { "category": "external", "summary": "http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc", "url": "http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc" } ], "release_date": "2014-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:30:03+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BRMS are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BRMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Camel: XML eXternal Entity (XXE) flaw in XSLT component" }, { "acknowledgments": [ { "names": [ "David Jorm" ], "organization": "Red Hat Security Response Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-0003", "discovery_date": "2014-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1049692" } ], "notes": [ { "category": "description", "text": "The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.", "title": "Vulnerability description" }, { "category": "summary", "text": "Camel: remote code execution via XSL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0003" }, { "category": "external", "summary": "RHBZ#1049692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049692" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0003" }, { "category": "external", "summary": "http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc", "url": "http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc" } ], "release_date": "2014-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T21:30:03+00:00", "details": "The References section of this erratum contains download links (you must\nlog in to download the updates). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server process.\n\nThe fix for CVE-2013-6468 enables the Java Security Manager (JSM) to\nsandbox the evaluation of MVEL expressions. This introduces performance\ndegradation in high load environments. The following ways of running Red\nHat JBoss BRMS are considered secure while mitigating performance\ndegradation:\n\n1. In high load environments where performance is critical, it is\nrecommended to only deploy applications that have been developed on other\nsystems and properly reviewed. It is also recommended not to create any\nusers with the Analyst role on such systems. If these safeguards are\nfollowed, it is safe to leave JSM disabled on these systems so it does not\nintroduce any performance degradation.\n\n2. In testing and development environments without high loads, or in\nenvironments where rule authoring is exposed to external networks, it is\nrecommended to have JSM enabled in order to achieve security benefits of\nproperly sandboxed evaluation of MVEL expressions.\n\nAllowing users with the Analyst role to log in to the Business Central\nconsole when JSM is disabled is not secure and not recommended.", "product_ids": [ "Red Hat JBoss BRMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Camel: remote code execution via XSL" } ] }
rhsa-2012_1057
Vulnerability from csaf_redhat
Published
2012-07-05 19:20
Modified
2024-11-14 11:31
Summary
Red Hat Security Advisory: resteasy security update
Notes
Topic
An update for JBoss Enterprise Web Platform 5.1.2 that fixes one security
issue is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
RESTEasy provides various frameworks to help you build RESTful web services
and RESTful Java applications.
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
Note: The fix for CVE-2012-0818 is not enabled by default. This update adds
a new configuration option to disable entity expansion in RESTEasy. If
applications on your server expose RESTEasy XML endpoints, a
resteasy.document.expand.entity.references configuration snippet must be
added to their web.xml file to disable entity expansion in RESTEasy. Refer
to Red Hat Bugzilla bug 785631 for details.
Warning: Before applying this update, back up your JBoss Enterprise Web
Platform's "jboss-as-web/server/[PROFILE]/deploy/" directory and any other
customized configuration files.
All users of JBoss Enterprise Web Platform 5.1.2 as provided from the Red
Hat Customer Portal are advised to install this update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for JBoss Enterprise Web Platform 5.1.2 that fixes one security\nissue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise Web\nPlatform\u0027s \"jboss-as-web/server/[PROFILE]/deploy/\" directory and any other\ncustomized configuration files.\n\nAll users of JBoss Enterprise Web Platform 5.1.2 as provided from the Red\nHat Customer Portal are advised to install this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1057", "url": "https://access.redhat.com/errata/RHSA-2012:1057" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=securityPatches\u0026version=5.1.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=securityPatches\u0026version=5.1.2" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1057.json" } ], "title": "Red Hat Security Advisory: resteasy security update", "tracking": { "current_release_date": "2024-11-14T11:31:21+00:00", "generator": { "date": "2024-11-14T11:31:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1057", "initial_release_date": "2012-07-05T19:20:00+00:00", "revision_history": [ { "date": "2012-07-05T19:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-07-05T19:27:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:31:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Platform 5.1", "product": { "name": "Red Hat JBoss Web Platform 5.1", "product_id": "Red Hat JBoss Web Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:20:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1057" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:20:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).\n\nThe JBoss server process must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1057" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
rhsa-2012_1058
Vulnerability from csaf_redhat
Published
2012-07-05 19:23
Modified
2024-11-14 11:31
Summary
Red Hat Security Advisory: resteasy security update
Notes
Topic
Updated resteasy packages that fix one security issue are now available for
JBoss Enterprise Web Platform 5.1.2 for Red Hat Enterprise Linux 4, 5, and
6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
RESTEasy provides various frameworks to help you build RESTful web services
and RESTful Java applications.
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
Note: The fix for CVE-2012-0818 is not enabled by default. This update adds
a new configuration option to disable entity expansion in RESTEasy. If
applications on your server expose RESTEasy XML endpoints, a
resteasy.document.expand.entity.references configuration snippet must be
added to their web.xml file to disable entity expansion in RESTEasy. Refer
to Red Hat Bugzilla bug 785631 for details.
Warning: Before applying this update, back up your JBoss Enterprise Web
Platform's "jboss-as-web/server/[PROFILE]/deploy/" directory and any other
customized configuration files.
Users of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise Linux 4,
5, and 6 should upgrade to these updated packages, which correct this
issue. The JBoss server process must be restarted for this update to take
effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated resteasy packages that fix one security issue are now available for\nJBoss Enterprise Web Platform 5.1.2 for Red Hat Enterprise Linux 4, 5, and\n6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise Web\nPlatform\u0027s \"jboss-as-web/server/[PROFILE]/deploy/\" directory and any other\ncustomized configuration files.\n\nUsers of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise Linux 4,\n5, and 6 should upgrade to these updated packages, which correct this\nissue. The JBoss server process must be restarted for this update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1058", "url": "https://access.redhat.com/errata/RHSA-2012:1058" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1058.json" } ], "title": "Red Hat Security Advisory: resteasy security update", "tracking": { "current_release_date": "2024-11-14T11:31:25+00:00", "generator": { "date": "2024-11-14T11:31:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1058", "initial_release_date": "2012-07-05T19:23:00+00:00", "revision_history": [ { "date": "2012-07-05T19:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-07-05T19:27:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:31:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Platform" }, { "branches": [ { "category": "product_version", "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_id": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-10.CP02_patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_id": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-10.CP02_patch01.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_id": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-10.CP02_patch01.1.ep5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "product": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "product_id": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@1.2.1-10.CP02_patch01.1.ep5.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src" }, "product_reference": "resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" }, "product_reference": "resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEWP-5" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-5245", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ], "known_not_affected": [ "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5245" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5245" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1058" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ], "known_not_affected": [ "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4AS-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el4.src", "4ES-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-05T19:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1058" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el5.src", "5Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "5Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el5.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-0:1.2.1-10.CP02_patch01.1.ep5.el6.src", "6Server-JBEWP-5:resteasy-examples-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-javadoc-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch", "6Server-JBEWP-5:resteasy-manual-0:1.2.1-10.CP02_patch01.1.ep5.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
ghsa-wrrh-g7h3-gqmx
Vulnerability from github
Published
2022-05-17 01:49
Modified
2022-07-13 18:42
Summary
Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy
Details
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.jboss.resteasy:resteasy-client" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.3.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2012-0818" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": true, "github_reviewed_at": "2022-07-13T18:42:09Z", "nvd_published_at": "2012-11-23T20:55:00Z", "severity": "MODERATE" }, "details": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "id": "GHSA-wrrh-g7h3-gqmx", "modified": "2022-07-13T18:42:09Z", "published": "2022-05-17T01:49:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" }, { "type": "WEB", "url": "https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6" }, { "type": "WEB", "url": "https://web.archive.org/web/20200229045254/https://www.securityfocus.com/bid/51766" }, { "type": "WEB", "url": "https://web.archive.org/web/20200229044434/http://www.securityfocus.com/bid/51748" }, { "type": "WEB", "url": "https://issues.jboss.org/browse/RESTEASY-637" }, { "type": "PACKAGE", "url": "https://github.com/resteasy/Resteasy" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:0372" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:0371" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2013:1263" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1125" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1059" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1058" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1057" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1056" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0519" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0441" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0421" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html" } ], "schema_version": "1.4.0", "severity": [], "summary": "Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy" }
gsd-2012-0818
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2012-0818", "description": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "id": "GSD-2012-0818", "references": [ "https://access.redhat.com/errata/RHSA-2014:0372", "https://access.redhat.com/errata/RHSA-2014:0371", "https://access.redhat.com/errata/RHSA-2013:1263", "https://access.redhat.com/errata/RHSA-2012:1125", "https://access.redhat.com/errata/RHSA-2012:1059", "https://access.redhat.com/errata/RHSA-2012:1058", "https://access.redhat.com/errata/RHSA-2012:1057", "https://access.redhat.com/errata/RHSA-2012:1056", "https://access.redhat.com/errata/RHSA-2012:0519", "https://access.redhat.com/errata/RHSA-2012:0441", "https://access.redhat.com/errata/RHSA-2012:0421" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-0818" ], "details": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "id": "GSD-2012-0818", "modified": "2023-12-13T01:20:14.006210Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0818", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2012-1125.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html" }, { "name": "http://secunia.com/advisories/50084", "refsource": "MISC", "url": "http://secunia.com/advisories/50084" }, { "name": "http://rhn.redhat.com/errata/RHSA-2014-0371.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2014-0372.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html" }, { "name": "http://secunia.com/advisories/57716", "refsource": "MISC", "url": "http://secunia.com/advisories/57716" }, { "name": "http://secunia.com/advisories/57719", "refsource": "MISC", "url": "http://secunia.com/advisories/57719" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-0441.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-0519.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html" }, { "name": "http://secunia.com/advisories/48697", "refsource": "MISC", "url": "http://secunia.com/advisories/48697" }, { "name": "http://secunia.com/advisories/48954", "refsource": "MISC", "url": "http://secunia.com/advisories/48954" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1056.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1057.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1058.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1059.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html" }, { "name": "http://secunia.com/advisories/47818", "refsource": "MISC", "url": "http://secunia.com/advisories/47818" }, { "name": "http://secunia.com/advisories/47832", "refsource": "MISC", "url": "http://secunia.com/advisories/47832" }, { "name": "http://www.osvdb.org/78679", "refsource": "MISC", "url": "http://www.osvdb.org/78679" }, { "name": "http://www.securityfocus.com/bid/51748", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/51748" }, { "name": "http://www.securityfocus.com/bid/51766", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/51766" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808" }, { "name": "https://issues.jboss.org/browse/RESTEASY-637", "refsource": "MISC", "url": "https://issues.jboss.org/browse/RESTEASY-637" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=785631", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.3.1)", "affected_versions": "All versions before 2.3.1", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2022-07-13", "description": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "fixed_versions": [ "2.3.1" ], "identifier": "CVE-2012-0818", "identifiers": [ "GHSA-wrrh-g7h3-gqmx", "CVE-2012-0818" ], "not_impacted": "All versions starting from 2.3.1", "package_slug": "maven/org.jboss.resteasy/resteasy-client", "pubdate": "2022-05-17", "solution": "Upgrade to version 2.3.1 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "https://bugzilla.redhat.com/show_bug.cgi?id=785631", "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808", "https://issues.jboss.org/browse/RESTEASY-637", "http://rhn.redhat.com/errata/RHSA-2012-0441.html", "http://rhn.redhat.com/errata/RHSA-2012-0519.html", "http://rhn.redhat.com/errata/RHSA-2012-1056.html", "http://rhn.redhat.com/errata/RHSA-2012-1057.html", "http://rhn.redhat.com/errata/RHSA-2012-1058.html", "http://rhn.redhat.com/errata/RHSA-2012-1059.html", "http://rhn.redhat.com/errata/RHSA-2012-1125.html", "http://rhn.redhat.com/errata/RHSA-2014-0371.html", "http://rhn.redhat.com/errata/RHSA-2014-0372.html", "https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6", "https://github.com/advisories/GHSA-wrrh-g7h3-gqmx" ], "uuid": "724cb100-aa53-4796-8712-0425d08f3a10" }, { "affected_range": "(,2.3.1)", "affected_versions": "All versions before 2.3.1", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2017-08-28", "description": "RESTEasy allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "fixed_versions": [ "2.3.1" ], "identifier": "CVE-2012-0818", "identifiers": [ "CVE-2012-0818" ], "not_impacted": "All versions after 2.3.1", "package_slug": "maven/org.jboss.resteasy/resteasy-jaxrs", "pubdate": "2012-11-23", "solution": "Upgrade to version 2.3.1 or above.", "title": "Information Exposure", "urls": [ "https://issues.jboss.org/browse/RESTEASY-637", "https://issues.jboss.org/browse/RESTEASY-647", "https://issues.jboss.org/browse/RESTEASY-659" ], "uuid": "3d04b36a-467a-4ffe-91cc-7cf0c11327e7" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0818" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2012:1058", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html" }, { "name": "47832", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47832" }, { "name": "RHSA-2012:0441", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html" }, { "name": "https://issues.jboss.org/browse/RESTEASY-637", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://issues.jboss.org/browse/RESTEASY-637" }, { "name": "RHSA-2012:0519", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html" }, { "name": "50084", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50084" }, { "name": "51766", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/51766" }, { "name": "RHSA-2012:1056", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html" }, { "name": "51748", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/51748" }, { "name": "RHSA-2012:1125", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html" }, { "name": "78679", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/78679" }, { "name": "RHSA-2012:1059", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html" }, { "name": "47818", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47818" }, { "name": "RHSA-2012:1057", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=785631", "refsource": "MISC", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "name": "48697", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48697" }, { "name": "48954", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48954" }, { "name": "57716", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/57716" }, { "name": "RHSA-2014:0371", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html" }, { "name": "57719", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/57719" }, { "name": "RHSA-2014:0372", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html" }, { "name": "resteasy-xml-info-disclosure(72808)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T03:26Z", "publishedDate": "2012-11-23T20:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.