A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1814974 | patch vendor advisory issue tracking |
https://github.com/quarkusio/quarkus/issues/7248 | third party advisory issue tracking exploit |
https://issues.redhat.com/browse/RESTEASY-2519 | vendor advisory issue tracking permissions required |
https://security.netapp.com/advisory/ntap-20210706-0008/ | third party advisory |