CVE-2017-14868: Restlet Framework Ja-rs extension is vulnerable to XXE when using SimpleXMLProvider
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58718%
CWE
Published
10/17/2018
Updated
9/26/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.restlet.jse:org.restlet.ext.jaxrs | maven | < 2.3.11 | 2.3.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper XML parsing configuration in the Jax-rs extension's SimpleXMLProvider. The advisory explicitly states the issue occurs when using SimpleXMLProvider, and the CWE-611 confirms it's an XXE flaw. The Restlet team's own security documentation mentions they forked the simple-xml library to address unsafe parsing. The readFrom
method is the entry point for XML deserialization in JAX-RS providers, making it the logical location where external entity expansion would occur if not properly restricted.