GHSA-cvj4-g3gx-8vqq

Suggest an improvement
Source
https://github.com/advisories/GHSA-cvj4-g3gx-8vqq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-cvj4-g3gx-8vqq/GHSA-cvj4-g3gx-8vqq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cvj4-g3gx-8vqq
Aliases
Published
2018-10-17T00:04:18Z
Modified
2023-11-08T03:58:56.039619Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Restlet Framework allows remote attackers to access arbitrary files via a crafted REST API HTTP request
Details

Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-06-16T21:32:56Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-611"
    ]
}
References

Affected packages

Maven / org.restlet.jse:org.restlet

Package

Name
org.restlet.jse:org.restlet
View open source insights on deps.dev
Purl
pkg:maven/org.restlet.jse/org.restlet

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.12