Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2012-0818: Red Hat Customer Portal - Access to 24x7 support and knowledge

RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.

CVE
#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes#aws

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2012-07-05

Updated:

2012-07-05

RHSA-2012:1058 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: resteasy security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated resteasy packages that fix one security issue are now available for
JBoss Enterprise Web Platform 5.1.2 for Red Hat Enterprise Linux 4, 5, and

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

RESTEasy provides various frameworks to help you build RESTful web services
and RESTful Java applications.

It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)

Note: The fix for CVE-2012-0818 is not enabled by default. This update adds
a new configuration option to disable entity expansion in RESTEasy. If
applications on your server expose RESTEasy XML endpoints, a
resteasy.document.expand.entity.references configuration snippet must be
added to their web.xml file to disable entity expansion in RESTEasy. Refer
to Red Hat Bugzilla bug 785631 for details.

Warning: Before applying this update, back up your JBoss Enterprise Web
Platform’s “jboss-as-web/server/[PROFILE]/deploy/” directory and any other
customized configuration files.

Users of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise Linux 4,
5, and 6 should upgrade to these updated packages, which correct this
issue. The JBoss server process must be restarted for this update to take
effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • JBoss Enterprise Web Platform 5 for RHEL 6 x86_64
  • JBoss Enterprise Web Platform 5 for RHEL 6 i386
  • JBoss Enterprise Web Platform 5 for RHEL 5 x86_64
  • JBoss Enterprise Web Platform 5 for RHEL 5 i386

Fixes

  • BZ - 785631 - CVE-2012-0818 RESTEasy: XML eXternal Entity (XXE) flaw

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://bugzilla.redhat.com/show_bug.cgi?id=785631

JBoss Enterprise Web Platform 5 for RHEL 6

SRPM

resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.src.rpm

SHA-256: 3a4aa131006b3f037162518ce8d3881cf20627e5fad57dc0178d16f51a3f2c34

x86_64

resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: f6cf36beb96b4eba2422aaa299680bb5998f3bb2e666d1440e17402778064556

resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: 66e767ff2fb833d7110ada14a4cfca2855dd0e6f0a06ee5bcaa3f164b36773aa

resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: 87ce316af43982a162478015b480121e4519cde5bb925f9b7dfe4d15e743a6a7

resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: 99aaf805ad64df41f06723f68dc403f1c4ff9a8e03e56d08d1ccca29c53e19d5

i386

resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: f6cf36beb96b4eba2422aaa299680bb5998f3bb2e666d1440e17402778064556

resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: 66e767ff2fb833d7110ada14a4cfca2855dd0e6f0a06ee5bcaa3f164b36773aa

resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: 87ce316af43982a162478015b480121e4519cde5bb925f9b7dfe4d15e743a6a7

resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm

SHA-256: 99aaf805ad64df41f06723f68dc403f1c4ff9a8e03e56d08d1ccca29c53e19d5

JBoss Enterprise Web Platform 5 for RHEL 5

SRPM

resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.src.rpm

SHA-256: ee147792cda48183d01057a03330a79257b1d81ce6d7ea8620db591b98068b31

x86_64

resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: f56fa438a6f2224e0d202a6b8de6a0932381c09aa5fc55eaa78301f156bd7b8f

resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: e8412efaa309aa52bfb86f39ac3009e5d0033e3c9f568da90436f2443e3d038e

resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: ce177e7e41c6651fbebe4b3ac6235cb0a2f79482a9ee9067ae36391be84351b1

resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: 9ebfc64848b1f317822f255d08e9bcb72c85e69ff4965836ab0884cdc68ca0f6

i386

resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: f56fa438a6f2224e0d202a6b8de6a0932381c09aa5fc55eaa78301f156bd7b8f

resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: e8412efaa309aa52bfb86f39ac3009e5d0033e3c9f568da90436f2443e3d038e

resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: ce177e7e41c6651fbebe4b3ac6235cb0a2f79482a9ee9067ae36391be84351b1

resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm

SHA-256: 9ebfc64848b1f317822f255d08e9bcb72c85e69ff4965836ab0884cdc68ca0f6

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907