vulnerability
Oracle Linux: CVE-2016-7050: ELSA-2016-2604: resteasy-base security and bug fix update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | 2016-09-23 | 2016-11-09 | 2024-11-25 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
2016-09-23
Added
2016-11-09
Modified
2024-11-25
Description
SerializableProvider in RESTEasy in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to execute arbitrary code.
It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw execute arbitrary code with the permissions of the application using RESTEasy.
It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw execute arbitrary code with the permissions of the application using RESTEasy.
Solution(s)
oracle-linux-upgrade-resteasy-baseoracle-linux-upgrade-resteasy-base-atom-provideroracle-linux-upgrade-resteasy-base-clientoracle-linux-upgrade-resteasy-base-jackson-provideroracle-linux-upgrade-resteasy-base-javadocoracle-linux-upgrade-resteasy-base-jaxb-provideroracle-linux-upgrade-resteasy-base-jaxrsoracle-linux-upgrade-resteasy-base-jaxrs-alloracle-linux-upgrade-resteasy-base-jaxrs-apioracle-linux-upgrade-resteasy-base-jettison-provideroracle-linux-upgrade-resteasy-base-providers-pomoracle-linux-upgrade-resteasy-base-resteasy-pomoracle-linux-upgrade-resteasy-base-tjws

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.