CVE-2014-3530
PicketLink: XXE via insecure DocumentBuilderFactory usage
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue.
El método org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory en PicketLink, utilizado en Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 y 6.2.4, expande referencias de entidad, lo que permite a atacantes remotos leer código arbitrario y posiblemente tener otro impacto no especificado a través de vectores no especificados, relacionado con un problema de entidad externa XML (XXE).
It was found that the implementation of the org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory() method provided a DocumentBuilderFactory that would expand entity references. A remote, unauthenticated attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-05-14 CVE Reserved
- 2014-07-15 CVE Published
- 2024-03-03 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/60047 | Third Party Advisory | |
http://secunia.com/advisories/60124 | Third Party Advisory | |
http://www.securitytracker.com/id/1030607 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94700 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0883.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0884.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0885.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0886.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2015-0091.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2015-0675.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2015-0720.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2015-0765.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2015-1888.html | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2014-3530 | 2015-10-12 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1112987 | 2015-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 5.2.0 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "5.2.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 6.2.4 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "6.2.4" | - |
Affected
|