Executive Summary

Informations
NameCVE-2017-14949First vendor Publication2017-11-30
VendorCveLast vendor Modification2017-12-15

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14949

CWE : Common Weakness Enumeration

%idName
100 %CWE-611Information Leak Through XML External Entity File Disclosure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application17

Sources (Detail)

SourceUrl
MISC https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements
https://lgtm.com/blog/restlet_CVE-2017-14949

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2017-12-16 00:21:38
  • Multiple Updates
2017-11-30 21:22:32
  • First insertion