First published: Thu Mar 25 2021(Updated: )
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Resteasy | <=4.6.0 | |
NetApp OnCommand Insight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20293 is a reflected Cross-Site Scripting (XSS) vulnerability found in RESTEasy up to version 4.6.0.Final.
The severity of CVE-2021-20293 is medium, with a CVSS score of 6.1.
CVE-2021-20293 affects Redhat Resteasy up to version 4.6.0, allowing an attacker to launch a reflected XSS attack.
CVE-2021-20293 also affects NetApp OnCommand Insight, but specific versions are not mentioned in the vulnerability report.
Yes, fixes for CVE-2021-20293 are available. Please refer to the provided references for more information.