A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1935927 | Issue Tracking Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1935927 | Issue Tracking Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1935927 - Issue Tracking, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory |
Information
Published : 2021-03-26 17:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20289
Mitre link : CVE-2021-20289
CVE.ORG link : CVE-2021-20289
JSON object : View
Products Affected
netapp
- oncommand_insight
redhat
- resteasy
oracle
- communications_cloud_native_core_console
quarkus
- quarkus
CWE
CWE-209
Generation of Error Message Containing Sensitive Information