First published: Tue Nov 02 2021(Updated: )
This release of Red Hat Integration - Service registry 2.0.2.GA serves as a replacement for 2.0.1.GA, and includes the below security fixes.<br>Security Fix(es):<br><li> apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956)</li> <li> RESTEasy: PathParam in RESTEasy can lead to a reflected XSS attack (CVE-2021-20293)</li> <li> resteasy: Error message exposes endpoint class information (CVE-2021-20289)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Integration Service Registry | =2.0.2.GA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:4100 is classified as important due to the potential exploitation of identified vulnerabilities.
To fix RHSA-2021:4100, you should upgrade to Red Hat Integration - Service Registry 2.0.2.GA or a later version.
RHSA-2021:4100 addresses vulnerabilities including CVE-2020-13956 related to the incorrect handling of malformed authority components in request URIs.
RHSA-2021:4100 affects Red Hat Integration - Service Registry versions prior to 2.0.2.GA.
While it is recommended to update to mitigate security risks, the necessity may depend on your specific security policies and environment.