First published: Thu Sep 01 2016(Updated: )
It was found that in some configurations the JacksonJsonpInterceptor is activated by default in RESTEasy. An attacker could use this flaw to launch a Cross Site Scripting Inclusion attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Resteasy | ||
redhat/resteasy | <3.1.0. | 3.1.0. |
redhat/resteasy | <3.0.20. | 3.0.20. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.