First published: Thu Sep 01 2016(Updated: )
It was found that there was insufficient use of randam values in RESTEasy async jobs. An attacker could use this flaw to steal user data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/resteasy | <3.1.0. | 3.1.0. |
redhat/resteasy | <3.0.20. | 3.0.20. |
Red Hat Resteasy Base JAX-RS API |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6345 has a medium severity rating due to its potential to expose sensitive user data.
To fix CVE-2016-6345, update to RESTEasy version 3.1.0 or higher if on version 3.1.x, or to version 3.0.20 if on version 3.0.x.
CVE-2016-6345 affects RESTEasy versions prior to 3.1.0 and 3.0.20 from Red Hat.
Exploitation of CVE-2016-6345 could allow an attacker to access and steal sensitive user data.
Organizations using vulnerable versions of RESTEasy are at risk of data breaches due to CVE-2016-6345.