vulnerability
Amazon Linux AMI 2: CVE-2021-20289: Security patch for resteasy-base (ALAS-2024-2398)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | 2021-03-26 | 2024-01-10 | 2024-01-10 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
2021-03-26
Added
2024-01-10
Modified
2024-01-10
Description
A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
Solution(s)
amazon-linux-ami-2-upgrade-resteasy-baseamazon-linux-ami-2-upgrade-resteasy-base-atom-provideramazon-linux-ami-2-upgrade-resteasy-base-clientamazon-linux-ami-2-upgrade-resteasy-base-jackson-provideramazon-linux-ami-2-upgrade-resteasy-base-javadocamazon-linux-ami-2-upgrade-resteasy-base-jaxb-provideramazon-linux-ami-2-upgrade-resteasy-base-jaxrsamazon-linux-ami-2-upgrade-resteasy-base-jaxrs-allamazon-linux-ami-2-upgrade-resteasy-base-jaxrs-apiamazon-linux-ami-2-upgrade-resteasy-base-jettison-provideramazon-linux-ami-2-upgrade-resteasy-base-providers-pomamazon-linux-ami-2-upgrade-resteasy-base-resteasy-pomamazon-linux-ami-2-upgrade-resteasy-base-tjws

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.