Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1107901 - (CVE-2014-3490) CVE-2014-3490 RESTEasy: XXE via parameter entities
CVE-2014-3490 RESTEasy: XXE via parameter entities
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140723,repor...
: Security
Depends On: 1121906 1160697 1121894 1121895 1121896 1121897 1121898 1121899 1121900 1121901 1121902 1121903 1121904 1121905 1121907 1121908 1121909 1121910 1121911 1121912 1121913 1121914 1121915 1121916 1121917 1121918 1130248
Blocks: 1082938 1105426 1107902 1121942 1128762 1139455 1142503 1181883 1182400 1182419 1187398 1200191
  Show dependency treegraph
 
Reported: 2014-06-10 21:51 EDT by David Jorm
Modified: 2018-06-29 18:01 EDT (History)
48 users (show)

See Also:
Fixed In Version: resteasy 3.0.9.Final, resteasy 2.3.8.SP2, resteasy 2.3.8.SP1-redhat-1
Doc Type: Bug Fix
Doc Text:
It was found that the fix for CVE-2012-0818 was incomplete: external parameter entities were not disabled when the resteasy.document.expand.entity.references parameter was set to false. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1011 normal SHIPPED_LIVE Moderate: resteasy-base security update 2014-08-06 01:02:45 EDT
Red Hat Product Errata RHSA-2014:1039 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.3.0 security update 2014-08-11 16:44:36 EDT
Red Hat Product Errata RHSA-2014:1040 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.3.0 security update 2014-08-11 17:05:15 EDT
Red Hat Product Errata RHSA-2014:1298 normal SHIPPED_LIVE Moderate: Red Hat JBoss Data Grid 6.3.1 update 2014-09-24 16:53:49 EDT
Red Hat Product Errata RHSA-2014:1904 normal SHIPPED_LIVE Important: Red Hat JBoss Operations Network 3.3.0 update 2014-11-25 16:48:32 EST
Red Hat Product Errata RHSA-2015:0125 normal SHIPPED_LIVE Important: Red Hat JBoss Web Framework Kit 2.7.0 update 2015-02-04 17:41:57 EST
Red Hat Product Errata RHSA-2015:0234 normal SHIPPED_LIVE Important: Red Hat JBoss BPM Suite 6.0.3 security update 2015-02-17 22:27:47 EST
Red Hat Product Errata RHSA-2015:0235 normal SHIPPED_LIVE Important: Red Hat JBoss BRMS 6.0.3 security update 2015-02-17 22:27:36 EST
Red Hat Product Errata RHSA-2015:0675 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.1.0 update 2015-03-11 16:51:21 EDT
Red Hat Product Errata RHSA-2015:0720 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse Service Works 6.0.0 security update 2015-03-24 21:05:53 EDT
Red Hat Product Errata RHSA-2015:0765 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.0.0 security update 2015-03-31 17:00:43 EDT
Red Hat Product Errata RHSA-2015:1009 normal SHIPPED_LIVE Important: Red Hat JBoss Portal 6.2.0 update 2015-05-14 15:14:47 EDT

  None (edit)
Description David Jorm 2014-06-10 21:51:33 EDT
IssueDescription:

It was found that the fix for CVE-2012-0818 was incomplete: external parameter entities were not disabled when the resteasy.document.expand.entity.references parameter was set to false. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Comment 1 Trevor Jay 2014-06-10 22:16:54 EDT
Acknowledgements:

This issue was discovered by David Jorm of Red Hat Product Security.
Comment 2 David Jorm 2014-06-12 21:18:25 EDT
Upstream bug (currently private):

https://issues.jboss.org/browse/RESTEASY-1073
Comment 8 Ron Sigal 2014-08-05 20:46:39 EDT
Weinan's PR https://github.com/resteasy/Resteasy/pull/533 (Branch_2_3) and my PR https://github.com/resteasy/Resteasy/pull/521 (master branch) have been applied, and RESTEASY-1073 is closed.
Comment 9 errata-xmlrpc 2014-08-05 21:02:55 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 7

Via RHSA-2014:1011 https://rhn.redhat.com/errata/RHSA-2014-1011.html
Comment 10 errata-xmlrpc 2014-08-11 12:46:07 EDT
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 6.3.0

Via RHSA-2014:1039 https://rhn.redhat.com/errata/RHSA-2014-1039.html
Comment 11 errata-xmlrpc 2014-08-11 13:05:28 EDT
This issue has been addressed in following products:

  JBEAP 6.3.z for RHEL 6
  JBEAP 6.3.z for RHEL 5
  JBEAP 6.3.z for RHEL 7

Via RHSA-2014:1040 https://rhn.redhat.com/errata/RHSA-2014-1040.html
Comment 12 Arun Babu Neelicattu 2014-08-14 12:20:45 EDT
Created resteasy tracking bugs for this issue:

Affects: fedora-all [bug 1130248]
Comment 13 Arun Babu Neelicattu 2014-08-14 12:22:39 EDT
Victims Record:

https://github.com/victims/victims-cve-db/blob/master/database/java/2014/3490.yaml
Comment 14 errata-xmlrpc 2014-09-24 12:54:01 EDT
This issue has been addressed in the following products:

  JBoss Data Grid 6.3.1

Via RHSA-2014:1298 https://rhn.redhat.com/errata/RHSA-2014-1298.html
Comment 22 errata-xmlrpc 2014-11-25 11:48:59 EST
This issue has been addressed in the following products:

  JBoss Operations Network 3.3.0

Via RHSA-2014:1904 https://rhn.redhat.com/errata/RHSA-2014-1904.html
Comment 23 errata-xmlrpc 2015-02-04 12:42:12 EST
This issue has been addressed in the following products:

  JBoss Web Framework Kit 2.7.0

Via RHSA-2015:0125 https://rhn.redhat.com/errata/RHSA-2015-0125.html
Comment 24 errata-xmlrpc 2015-02-17 17:28:59 EST
This issue has been addressed in the following products:

  Red Hat JBoss BRMS 6.0.3

Via RHSA-2015:0235 https://rhn.redhat.com/errata/RHSA-2015-0235.html
Comment 25 errata-xmlrpc 2015-02-17 17:33:24 EST
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite 6.0.3

Via RHSA-2015:0234 https://rhn.redhat.com/errata/RHSA-2015-0234.html
Comment 27 errata-xmlrpc 2015-03-11 12:53:28 EDT
This issue has been addressed in the following products:

JBoss Data Virtualization 6.1.0

Via RHSA-2015:0675 https://rhn.redhat.com/errata/RHSA-2015-0675.html
Comment 28 errata-xmlrpc 2015-03-24 17:06:54 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse Service Works 6.0.0

Via RHSA-2015:0720 https://rhn.redhat.com/errata/RHSA-2015-0720.html
Comment 29 errata-xmlrpc 2015-03-31 13:01:49 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Data Virtualization 6.0.0

Via RHSA-2015:0765 https://rhn.redhat.com/errata/RHSA-2015-0765.html
Comment 33 Fedora Update System 2015-04-24 18:47:01 EDT
resteasy-3.0.6-3.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 34 errata-xmlrpc 2015-05-14 11:21:01 EDT
This issue has been addressed in the following products:

  JBoss Portal 6.2.0

Via RHSA-2015:1009 https://rhn.redhat.com/errata/RHSA-2015-1009.html

Note You need to log in before you can comment on or make changes to this bug.