CVE-2017-14949 – org.restlet.jse:org.restlet
Package
Manager: maven
Name: org.restlet.jse:org.restlet
Vulnerable Version: >=0 <2.3.12
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00512 pctl0.65489
Details
Restlet Framework allows remote attackers to access arbitrary files via a crafted REST API HTTP request Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation.
Metadata
Created: 2018-10-17T00:04:18Z
Modified: 2022-04-26T21:37:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-cvj4-g3gx-8vqq/GHSA-cvj4-g3gx-8vqq.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-cvj4-g3gx-8vqq
Finding: F083
Auto approve: 1