Description
Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation.
Remediation
References
https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements
https://lgtm.com/blog/restlet_CVE-2017-14949
Related Vulnerabilities
CVE-2018-9159 Vulnerability in maven package com.sparkjava:spark-core
CVE-2022-25979 Vulnerability in npm package jsuites
CVE-2020-7773 Vulnerability in npm package markdown-it-highlightjs
CVE-2020-28479 Vulnerability in maven package org.webjars.bower:jointjs
CVE-2020-7616 Vulnerability in npm package express-mock-middleware