CVE-2021-20289

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1935927 Issue Tracking Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1935927 Issue Tracking Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:46

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1935927 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1935927 - Issue Tracking, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory

Information

Published : 2021-03-26 17:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20289

Mitre link : CVE-2021-20289

CVE.ORG link : CVE-2021-20289


JSON object : View

Products Affected

netapp

  • oncommand_insight

redhat

  • resteasy

oracle

  • communications_cloud_native_core_console

quarkus

  • quarkus
CWE
CWE-209

Generation of Error Message Containing Sensitive Information