Search for packages
| purl | pkg:maven/org.jboss.resteasy/resteasy-core@4.6.1.Alpha1 |
| Next non-vulnerable version | 4.7.8.Final |
| Latest non-vulnerable version | 6.2.3.Final |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2thz-p7bw-7bdk
Aliases: CVE-2021-20289 GHSA-244r-fcj3-ghjq |
Exposure of class information in RESTEasy A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-etyq-9yys-tkdf
Aliases: CVE-2023-0482 GHSA-2c6g-pfx3-w7h8 GHSA-jrmh-v64j-mjm9 |
Insecure Temporary File in RESTEasy In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-dww4-f31f-h7az | A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity. |
CVE-2021-20293
GHSA-5h26-c766-g93v |