Information Exposure Affecting org.jboss.resteasy:resteasy-jaxrs Open this link in a new tab package, versions [0,2.3.2.Final)


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGJBOSSRESTEASY-31202

  • published

    9 Jan 2014

  • disclosed

    23 Nov 2012

  • credit

    Unknown

Overview

org.jboss.resteasy:resteasy-jaxrs The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.

References