Description
The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5744 | The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk. |
Github GHSA |
GHSA-x7xf-253v-x3w8 | Improper Restriction of XML External Entity Reference in Apache CXF JAX-RS |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T22:51:45.164Z
Reserved: 2016-10-18T00:00:00.000Z
Link: CVE-2016-8739
No data.
Status : Modified
Published: 2017-08-10T18:29:00.190
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-8739
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA