Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3599

Опубликовано: 18 нояб. 2014
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy

It was discovered that HornetQ REST did not set the resteasy.document.expand.entity.references context parameter to false by default. A HornetQ REST application, which does not explicitly set the required context parameter to false, may be vulnerable to XML External Entity (XXE) attacks. A remote attacker able to send XML requests to a HornetQ REST endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

Отчет

Not Vulnerable. HornetQ REST is not provided by any Red Hat product.

Меры по смягчению последствий

When using HornetQ REST in an application, add the following snippet to its web.xml file to disable entity expansion in RESTEasy as used by HornetQ REST endpoints: resteasy.document.expand.entity.references false Note that this setting has precedence over , and will override a contrary setting in an element.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 6hornetqNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=1130383REST: XXE due to insecure configuration of RestEasy

EPSS

Процентиль: 60%
0.00384
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.5
nvd
больше 6 лет назад

HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy

CVSS3: 6.5
github
почти 4 года назад

HornetQ REST vulnerable to Improper Restriction of XML External Entity Reference

EPSS

Процентиль: 60%
0.00384
Низкий

4.3 Medium

CVSS2