Skip to main content

Improper Restriction of XML External Entity Reference

CVE-2014-3643

Severity High
Score 7.5/10

Summary

It was found that external parameter entities were not disabled by the jersey SAX parser. A remote attacker able to send XML requests to a jersey endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XML External Entity (XXE) attacks. This issue affects versions prior to 1.13.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • NONE

CWE-611 - Improper Restriction of XML External Entity Reference

Listed 4th in the 'OWASP Top Ten', XML External Entities (XXE) vulnerability allows attackers to provide an XML input that contains an external entity. When the XML is parsed, it can cause data extraction and manipulation, execution of commands, denial-of-service attacks, and server-side request forgery.

Advisory Timeline

  • Published