It was found that the Apache Camel XSLT component would resolve entities in XML messages when transforming them using an xslt: route. A remote attacker able to submit messages to an xslt: Camel route could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Acknowledgements: This issue was discovered by David Jorm of the Red Hat Security Response Team.
Upstream bug: https://issues.apache.org/jira/browse/CAMEL-7130 Upstream patch commits: https://fisheye6.atlassian.com/changelog/camel-git?cs=7c9326f4962cdad97d5de89cfb4483e04cab1d35 https://fisheye6.atlassian.com/changelog/camel-git?cs=cc192f87b7c4a43c6cff0646486384c9946e2ac9
External References: http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc
This issue has been addressed in following products: Red Hat JBoss Fuse and A-MQ 6.0.0 R1 P3 Via RHSA-2014:0323 https://rhn.redhat.com/errata/RHSA-2014-0323.html
This issue has been addressed in following products: Red Hat JBoss BPM Suite 6.0.1 Via RHSA-2014:0371 https://rhn.redhat.com/errata/RHSA-2014-0371.html
This issue has been addressed in following products: Red Hat JBoss BRMS 6.0.1 Via RHSA-2014:0372 https://rhn.redhat.com/errata/RHSA-2014-0372.html
This issue has been addressed in following products: Fuse ESB Enterprise/MQ Enterprise 7.1.0 R1 P3 Via RHSA-2014:0452 https://rhn.redhat.com/errata/RHSA-2014-0452.html
This issue has been addressed in following products: Red Hat JBoss Fuse Service Works 6.0.0 Via RHSA-2014:0459 https://rhn.redhat.com/errata/RHSA-2014-0459.html