CVE-2014-3530

The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.4:*:*:*:*:*:*:*

History

13 Feb 2023, 00:40

Type Values Removed Values Added
Summary It was found that the implementation of the org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory() method provided a DocumentBuilderFactory that would expand entity references. A remote, unauthenticated attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks. The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue.
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1009', 'name': 'https://access.redhat.com/errata/RHSA-2015:1009', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0885', 'name': 'https://access.redhat.com/errata/RHSA-2014:0885', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2014-3530', 'name': 'https://access.redhat.com/security/cve/CVE-2014-3530', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1888', 'name': 'https://access.redhat.com/errata/RHSA-2015:1888', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1112987', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1112987', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0091', 'name': 'https://access.redhat.com/errata/RHSA-2015:0091', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0883', 'name': 'https://access.redhat.com/errata/RHSA-2014:0883', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0910', 'name': 'https://access.redhat.com/errata/RHSA-2014:0910', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0898', 'name': 'https://access.redhat.com/errata/RHSA-2014:0898', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0675', 'name': 'https://access.redhat.com/errata/RHSA-2015:0675', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0897', 'name': 'https://access.redhat.com/errata/RHSA-2014:0897', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0765', 'name': 'https://access.redhat.com/errata/RHSA-2015:0765', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0234', 'name': 'https://access.redhat.com/errata/RHSA-2015:0234', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0886', 'name': 'https://access.redhat.com/errata/RHSA-2014:0886', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0720', 'name': 'https://access.redhat.com/errata/RHSA-2015:0720', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0884', 'name': 'https://access.redhat.com/errata/RHSA-2014:0884', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0235', 'name': 'https://access.redhat.com/errata/RHSA-2015:0235', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 20:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1009 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0885 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2014-3530 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1888 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1112987 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0091 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0883 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0910 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0898 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0675 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0897 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0765 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0234 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0886 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0720 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0884 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0235 -
Summary The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue. It was found that the implementation of the org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory() method provided a DocumentBuilderFactory that would expand entity references. A remote, unauthenticated attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

Information

Published : 2014-07-22 20:55

Updated : 2023-12-10 11:31


NVD link : CVE-2014-3530

Mitre link : CVE-2014-3530

CVE.ORG link : CVE-2014-3530


JSON object : View

Products Affected

redhat

  • jboss_enterprise_application_platform
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor