Description
Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation.
Remediation
References
https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements
https://lgtm.com/blog/restlet_CVE-2017-14949
Related Vulnerabilities
CVE-2022-3171 Vulnerability in maven package com.google.protobuf:protobuf-javalite
CVE-2021-21122 Vulnerability in maven package org.webjars.npm:electron
CVE-2021-21479 Vulnerability in maven package com.sap.scimono:scimono-server
CVE-2020-28502 Vulnerability in npm package xmlhttprequest
CVE-2022-25873 Vulnerability in maven package org.webjars.npm:vuetify