Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nNGpnLWdwd3YtcDd3ds4AAaPj

Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy

The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.

Permalink: https://github.com/advisories/GHSA-g4jg-gpwv-p7wv
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nNGpnLWdwd3YtcDd3ds4AAaPj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 5 months ago


Identifiers: GHSA-g4jg-gpwv-p7wv, CVE-2011-5245
References: Repository: https://github.com/resteasy/resteasy
Blast Radius: 0.0

Affected Packages

maven:org.jboss.resteasy:resteasy-jaxb-provider
Dependent packages: 305
Dependent repositories: 2,455
Downloads:
Affected Version Ranges: < 2.3.2
Fixed in: 2.3.2
All affected versions:
All unaffected versions: