Headline
CVE-2012-0818: Red Hat Customer Portal - Access to 24x7 support and knowledge
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- OpenShift Dev Spaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2012-07-05
Updated:
2012-07-05
RHSA-2012:1058 - Security Advisory
- Overview
- Updated Packages
Synopsis
Moderate: resteasy security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Updated resteasy packages that fix one security issue are now available for
JBoss Enterprise Web Platform 5.1.2 for Red Hat Enterprise Linux 4, 5, and
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Description
RESTEasy provides various frameworks to help you build RESTful web services
and RESTful Java applications.
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
Note: The fix for CVE-2012-0818 is not enabled by default. This update adds
a new configuration option to disable entity expansion in RESTEasy. If
applications on your server expose RESTEasy XML endpoints, a
resteasy.document.expand.entity.references configuration snippet must be
added to their web.xml file to disable entity expansion in RESTEasy. Refer
to Red Hat Bugzilla bug 785631 for details.
Warning: Before applying this update, back up your JBoss Enterprise Web
Platform’s “jboss-as-web/server/[PROFILE]/deploy/” directory and any other
customized configuration files.
Users of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise Linux 4,
5, and 6 should upgrade to these updated packages, which correct this
issue. The JBoss server process must be restarted for this update to take
effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- JBoss Enterprise Web Platform 5 for RHEL 6 x86_64
- JBoss Enterprise Web Platform 5 for RHEL 6 i386
- JBoss Enterprise Web Platform 5 for RHEL 5 x86_64
- JBoss Enterprise Web Platform 5 for RHEL 5 i386
Fixes
- BZ - 785631 - CVE-2012-0818 RESTEasy: XML eXternal Entity (XXE) flaw
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://bugzilla.redhat.com/show_bug.cgi?id=785631
JBoss Enterprise Web Platform 5 for RHEL 6
SRPM
resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.src.rpm
SHA-256: 3a4aa131006b3f037162518ce8d3881cf20627e5fad57dc0178d16f51a3f2c34
x86_64
resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: f6cf36beb96b4eba2422aaa299680bb5998f3bb2e666d1440e17402778064556
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: 66e767ff2fb833d7110ada14a4cfca2855dd0e6f0a06ee5bcaa3f164b36773aa
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: 87ce316af43982a162478015b480121e4519cde5bb925f9b7dfe4d15e743a6a7
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: 99aaf805ad64df41f06723f68dc403f1c4ff9a8e03e56d08d1ccca29c53e19d5
i386
resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: f6cf36beb96b4eba2422aaa299680bb5998f3bb2e666d1440e17402778064556
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: 66e767ff2fb833d7110ada14a4cfca2855dd0e6f0a06ee5bcaa3f164b36773aa
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: 87ce316af43982a162478015b480121e4519cde5bb925f9b7dfe4d15e743a6a7
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
SHA-256: 99aaf805ad64df41f06723f68dc403f1c4ff9a8e03e56d08d1ccca29c53e19d5
JBoss Enterprise Web Platform 5 for RHEL 5
SRPM
resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.src.rpm
SHA-256: ee147792cda48183d01057a03330a79257b1d81ce6d7ea8620db591b98068b31
x86_64
resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: f56fa438a6f2224e0d202a6b8de6a0932381c09aa5fc55eaa78301f156bd7b8f
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: e8412efaa309aa52bfb86f39ac3009e5d0033e3c9f568da90436f2443e3d038e
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: ce177e7e41c6651fbebe4b3ac6235cb0a2f79482a9ee9067ae36391be84351b1
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: 9ebfc64848b1f317822f255d08e9bcb72c85e69ff4965836ab0884cdc68ca0f6
i386
resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: f56fa438a6f2224e0d202a6b8de6a0932381c09aa5fc55eaa78301f156bd7b8f
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: e8412efaa309aa52bfb86f39ac3009e5d0033e3c9f568da90436f2443e3d038e
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: ce177e7e41c6651fbebe4b3ac6235cb0a2f79482a9ee9067ae36391be84351b1
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
SHA-256: 9ebfc64848b1f317822f255d08e9bcb72c85e69ff4965836ab0884cdc68ca0f6
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.