First published: Thu Sep 01 2016(Updated: )
It was found that in some configurations the JacksonJsonpInterceptor is activated by default in RESTEasy. An attacker could use this flaw to launch a Cross Site Scripting Inclusion attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/resteasy | <3.1.0. | 3.1.0. |
redhat/resteasy | <3.0.20. | 3.0.20. |
Red Hat Resteasy Base JAX-RS API |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6348 is considered to have a high severity due to its potential to allow cross-site scripting attacks.
To fix CVE-2016-6348, upgrade RESTEasy to a version greater than 3.1.0 or 3.0.20 if you are using the vulnerable versions.
CVE-2016-6348 affects specific versions of RESTEasy, particularly 3.1.0 and 3.0.20.
Yes, CVE-2016-6348 can be exploited remotely by attackers leveraging the flaw in certain configurations.
CVE-2016-6348 facilitates a Cross Site Scripting Inclusion attack, which can compromise web application security.