Vulnerability Description
Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Restlet | Restlet | < 2.3.11 |
Related Weaknesses (CWE)
References
- https://github.com/restlet/restlet-framework-java/issues/1286Third Party Advisory
- https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancementsThird Party Advisory
- https://lgtm.com/blog/restlet_CVE-2017-14868Third Party Advisory
- https://github.com/restlet/restlet-framework-java/issues/1286Third Party Advisory
- https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancementsThird Party Advisory
- https://lgtm.com/blog/restlet_CVE-2017-14868Third Party Advisory
FAQ
What is CVE-2017-14868?
CVE-2017-14868 is a vulnerability with a CVSS score of 7.5 (HIGH). Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension.
How severe is CVE-2017-14868?
CVE-2017-14868 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14868?
Check the references section above for vendor advisories and patch information. Affected products include: Restlet Restlet.