CVE-2011-5245: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
References
- rhn.redhat.com/errata/RHSA-2012-1056.html
- rhn.redhat.com/errata/RHSA-2012-1058.html
- rhn.redhat.com/errata/RHSA-2012-1059.html
- rhn.redhat.com/errata/RHSA-2014-0371.html
- rhn.redhat.com/errata/RHSA-2014-0372.html
- www.osvdb.org/78680
- bugzilla.redhat.com/show_bug.cgi?id=785631
- exchange.xforce.ibmcloud.com/vulnerabilities/72808
- github.com/advisories/GHSA-g4jg-gpwv-p7wv
- github.com/resteasy/resteasy/pull/34
- issues.jboss.org/browse/RESTEASY-647
- issues.jboss.org/browse/RESTEASY/fixforversion/12318708
- nvd.nist.gov/vuln/detail/CVE-2011-5245
Detect and mitigate CVE-2011-5245 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →