← Volver a CVEs
CVE-2014-3481
N/ADescripcion
org.jboss.as.jaxrs.deployment.JaxrsIntegrationProcessor in Red Hat JBoss Enterprise Application Platform (JEAP) before 6.2.4 enables entity expansion, which allows remote attackers to read arbitrary files via unspecified vectors, related to an XML External Entity (XXE) issue.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado7/7/2014
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
redhat:jboss_enterprise_application_platform
Debilidades (CWE)
CWE-200
Referencias
http://rhn.redhat.com/errata/RHSA-2014-0797.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-0798.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-0799.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0675.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0720.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0765.html(secalert@redhat.com)
http://www.securitytracker.com/id/1032017(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1105242(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/94939(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-0797.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0798.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0799.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0675.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0720.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0765.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1032017(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1105242(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/94939(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.