First published: Thu Sep 01 2016(Updated: )
Cross-site scripting (XSS) vulnerability in the default exception handler in RESTEasy allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/resteasy | <3.1.0. | 3.1.0. |
redhat/resteasy | <3.0.20. | 3.0.20. |
Red Hat Resteasy Base JAX-RS API |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6347 is classified as a moderate severity cross-site scripting (XSS) vulnerability.
To fix CVE-2016-6347, upgrade RESTEasy to versions 3.1.0 or later, or to 3.0.20 if applicable.
CVE-2016-6347 allows remote attackers to inject arbitrary web scripts or HTML through the default exception handler.
RESTEasy versions up to and including 3.1.0 and 3.0.20 are affected by CVE-2016-6347.
Exploiting CVE-2016-6347 can lead to unauthorized access to sensitive data and session hijacking.