1 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Teiid before 8.4.3 and before 8.7 and Red Hat JBoss Data Virtualization 6.0.0 before patch 3 allows remote attackers to read arbitrary files via a crafted request to a REST endpoint, related to an XML External Entity (XXE) issue. Teiid anterior a 8.4.3 y anterior a 8.7 y Red Hat JBoss Data Virtualization 6.0.0 anterior a patch 3 permiten a atacantes remotos leer ficheros arbitrarios a través de una solicitud manipulada en un endpoint REST, relacionado con un problema de entidad externa XML (XXE). It was found that Teiid SQL/XML permitted XML eXternal Entity (XXE) attacks. If a REST endpoint was deployed, a remote attacker could submit a request containing an external XML entity that, when resolved, allowed that attacker to read files on the application server in the context of the user running that server. • http://rhn.redhat.com/errata/RHSA-2014-1284.html http://secunia.com/advisories/61530 http://www.securitytracker.com/id/1030886 https://exchange.xforce.ibmcloud.com/vulnerabilities/96192 https://issues.jboss.org/browse/TEIID-2911 https://access.redhat.com/security/cve/CVE-2014-0170 https://bugzilla.redhat.com/show_bug.cgi?id=1085554 • CWE-611: Improper Restriction of XML External Entity Reference •