First published: Thu Mar 25 2021(Updated: )
A cross-site scripting (XSS) flaw was found in RESTEasy, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. An attacker could use this flaw to launch a reflected XSS attack.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat RESTEasy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1942819 is considered to be significant due to the potential for reflected cross-site scripting attacks.
To fix REDHAT-BUG-1942819, ensure that RestEasy is updated to the latest version that addresses this XSS vulnerability.
The affected software for REDHAT-BUG-1942819 is Red Hat RESTEasy.
REDHAT-BUG-1942819 is classified as a cross-site scripting (XSS) vulnerability.
REDHAT-BUG-1942819 was discovered by Red Hat's internal security team.