Skip to content

Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Feb 15, 2023

Package

maven org.jboss.resteasy:resteasy-client (Maven)

Affected versions

< 2.3.1

Patched versions

2.3.1

Description

RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.

References

Published by the National Vulnerability Database Nov 23, 2012
Published to the GitHub Advisory Database May 17, 2022
Reviewed Jul 13, 2022
Last updated Feb 15, 2023

Severity

Moderate

EPSS score

0.372%
(73rd percentile)

Weaknesses

CVE ID

CVE-2012-0818

GHSA ID

GHSA-wrrh-g7h3-gqmx

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.