Information Exposure The advisory has been revoked - it doesn't affect any version of package org.jboss.resteasy:resteasy-jaxrs Open this link in a new tab
Threat Intelligence
EPSS
0.33% (71st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGJBOSSRESTEASY-31201
- published 9 Jan 2014
- disclosed 23 Nov 2012
- credit Unknown
Introduced: 23 Nov 2012
CVE-2011-5245 Open this link in a new tabOverview
org.jboss.resteasy:resteasy-jaxrs
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.