Skip to navigation

Security Advisory Moderate: resteasy security update

Advisory: RHSA-2012:1058-1
Type: Security Advisory
Severity: Moderate
Issued on: 2012-07-05
Last updated on: 2012-07-05
Affected Products: JBoss Enterprise Web Platform 5 EL4
JBoss Enterprise Web Platform 5 EL5
JBoss Enterprise Web Platform 5 EL6
CVEs (cve.mitre.org): CVE-2011-5245
CVE-2012-0818

Details

Updated resteasy packages that fix one security issue are now available for
JBoss Enterprise Web Platform 5.1.2 for Red Hat Enterprise Linux 4, 5, and
6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

RESTEasy provides various frameworks to help you build RESTful web services
and RESTful Java applications.

It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker submitted a request containing an external
XML entity to a RESTEasy endpoint, the entity would be resolved, allowing
the attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)

Note: The fix for CVE-2012-0818 is not enabled by default. This update adds
a new configuration option to disable entity expansion in RESTEasy. If
applications on your server expose RESTEasy XML endpoints, a
resteasy.document.expand.entity.references configuration snippet must be
added to their web.xml file to disable entity expansion in RESTEasy. Refer
to Red Hat Bugzilla bug 785631 for details.

Warning: Before applying this update, back up your JBoss Enterprise Web
Platform's "jboss-as-web/server/[PROFILE]/deploy/" directory and any other
customized configuration files.

Users of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise Linux 4,
5, and 6 should upgrade to these updated packages, which correct this
issue. The JBoss server process must be restarted for this update to take
effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

JBoss Enterprise Web Platform 5 EL4

SRPMS:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el4.src.rpm
File outdated by:  RHSA-2013:0197
    MD5: bc2551c0639feb18daf6099c5fd5ccff
SHA-256: 01121adc8b43b28161252c69ada5528d9d39c1ce03aff67def4f124f12e82bd4
 
IA-32:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: b15548c71680e99ae988bdb1bc37e20e
SHA-256: a1b4091bce13c3d253230124db5c69ccdb7c54ba46168d77ba7cc18af5b38687
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: ad2c693743b7142c42f89b40eba81c45
SHA-256: ea192d1df0959b778fe6951eeae7ca10985d10ba858c83861a3db628a050d3d5
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: d204846aae1a8ac4214abee372b18820
SHA-256: b8221067f37d9c039a733d168a15288c1504dabcefc7151984fdc492301939d3
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: 2875130e6719ad2b60633fbe89f1f2ab
SHA-256: 84f540c4f267a531e7d492d0cc0f1d99ee393947ba7a42492d29302d312f89ad
 
x86_64:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: b15548c71680e99ae988bdb1bc37e20e
SHA-256: a1b4091bce13c3d253230124db5c69ccdb7c54ba46168d77ba7cc18af5b38687
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: ad2c693743b7142c42f89b40eba81c45
SHA-256: ea192d1df0959b778fe6951eeae7ca10985d10ba858c83861a3db628a050d3d5
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: d204846aae1a8ac4214abee372b18820
SHA-256: b8221067f37d9c039a733d168a15288c1504dabcefc7151984fdc492301939d3
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el4.noarch.rpm
File outdated by:  RHSA-2013:0197
    MD5: 2875130e6719ad2b60633fbe89f1f2ab
SHA-256: 84f540c4f267a531e7d492d0cc0f1d99ee393947ba7a42492d29302d312f89ad
 
JBoss Enterprise Web Platform 5 EL5

SRPMS:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.src.rpm
File outdated by:  RHSA-2013:0196
    MD5: 2594ee29afd743db9de6597438236093
SHA-256: ee147792cda48183d01057a03330a79257b1d81ce6d7ea8620db591b98068b31
 
IA-32:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: dbb79544189e69e7eae3b4c9c0558bcb
SHA-256: f56fa438a6f2224e0d202a6b8de6a0932381c09aa5fc55eaa78301f156bd7b8f
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: 065b5d196e422fe6376253e5cffdaaa4
SHA-256: e8412efaa309aa52bfb86f39ac3009e5d0033e3c9f568da90436f2443e3d038e
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: 087594c112837798dbbb9316b4ecfa77
SHA-256: ce177e7e41c6651fbebe4b3ac6235cb0a2f79482a9ee9067ae36391be84351b1
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: f7e2ec86d903d8c47bff6393d318a259
SHA-256: 9ebfc64848b1f317822f255d08e9bcb72c85e69ff4965836ab0884cdc68ca0f6
 
x86_64:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: dbb79544189e69e7eae3b4c9c0558bcb
SHA-256: f56fa438a6f2224e0d202a6b8de6a0932381c09aa5fc55eaa78301f156bd7b8f
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: 065b5d196e422fe6376253e5cffdaaa4
SHA-256: e8412efaa309aa52bfb86f39ac3009e5d0033e3c9f568da90436f2443e3d038e
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: 087594c112837798dbbb9316b4ecfa77
SHA-256: ce177e7e41c6651fbebe4b3ac6235cb0a2f79482a9ee9067ae36391be84351b1
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0196
    MD5: f7e2ec86d903d8c47bff6393d318a259
SHA-256: 9ebfc64848b1f317822f255d08e9bcb72c85e69ff4965836ab0884cdc68ca0f6
 
JBoss Enterprise Web Platform 5 EL6

SRPMS:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.src.rpm
File outdated by:  RHSA-2013:0195
    MD5: c37a2fa746f28ad0b7902d4d8acc9108
SHA-256: 3a4aa131006b3f037162518ce8d3881cf20627e5fad57dc0178d16f51a3f2c34
 
IA-32:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: db142a9479cf21954851f4830e9df6df
SHA-256: f6cf36beb96b4eba2422aaa299680bb5998f3bb2e666d1440e17402778064556
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: 7da88f22fad75b21e957a6ed466ede98
SHA-256: 66e767ff2fb833d7110ada14a4cfca2855dd0e6f0a06ee5bcaa3f164b36773aa
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: e17875ba60a4e65e3e663c83dfeb953a
SHA-256: 87ce316af43982a162478015b480121e4519cde5bb925f9b7dfe4d15e743a6a7
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: 76247b8541d58b70247c73929e661ba8
SHA-256: 99aaf805ad64df41f06723f68dc403f1c4ff9a8e03e56d08d1ccca29c53e19d5
 
x86_64:
resteasy-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: db142a9479cf21954851f4830e9df6df
SHA-256: f6cf36beb96b4eba2422aaa299680bb5998f3bb2e666d1440e17402778064556
resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: 7da88f22fad75b21e957a6ed466ede98
SHA-256: 66e767ff2fb833d7110ada14a4cfca2855dd0e6f0a06ee5bcaa3f164b36773aa
resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: e17875ba60a4e65e3e663c83dfeb953a
SHA-256: 87ce316af43982a162478015b480121e4519cde5bb925f9b7dfe4d15e743a6a7
resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el6.noarch.rpm
File outdated by:  RHSA-2013:0195
    MD5: 76247b8541d58b70247c73929e661ba8
SHA-256: 99aaf805ad64df41f06723f68dc403f1c4ff9a8e03e56d08d1ccca29c53e19d5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

785631 - CVE-2012-0818 RESTEasy: XML eXternal Entity (XXE) flaw


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/