It was found that external parameter entities were not disabled by the jersey SAX parser. A remote attacker able to send XML requests to a jersey endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
I would like to propose notifying upstream and then unembargoing this issue in 1-2 weeks as it is only moderate severity and appears stalled. If there is a significant reason to leave this issue embargoed please let me know.
unembargoed.