CVE-2012-0818: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
References
- rhn.redhat.com/errata/RHSA-2012-0441.html
- rhn.redhat.com/errata/RHSA-2012-0519.html
- rhn.redhat.com/errata/RHSA-2012-1056.html
- rhn.redhat.com/errata/RHSA-2012-1057.html
- rhn.redhat.com/errata/RHSA-2012-1058.html
- rhn.redhat.com/errata/RHSA-2012-1059.html
- rhn.redhat.com/errata/RHSA-2012-1125.html
- rhn.redhat.com/errata/RHSA-2014-0371.html
- rhn.redhat.com/errata/RHSA-2014-0372.html
- bugzilla.redhat.com/show_bug.cgi?id=785631
- exchange.xforce.ibmcloud.com/vulnerabilities/72808
- github.com/advisories/GHSA-wrrh-g7h3-gqmx
- github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6
- issues.jboss.org/browse/RESTEASY-637
- nvd.nist.gov/vuln/detail/CVE-2012-0818
Detect and mitigate CVE-2012-0818 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →