3.15.6.Final
16 years ago
1 years ago
Known vulnerabilities in the org.jboss.resteasy:resteasy-jaxrs package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.jboss.resteasy:resteasy-jaxrs is a JCP specification that provides a Java API for RESTful Web Services over the HTTP protocol. Affected versions of this package are vulnerable to Improper Input Validation in How to fix Improper Input Validation? Upgrade | [,3.11.0.Final) |
org.jboss.resteasy:resteasy-jaxrs is a JCP specification that provides a Java API for RESTful Web Services over the HTTP protocol. Affected versions of this package are vulnerable to HTTP Request Smuggling. It was discovered that the CORS Filter did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances. How to fix HTTP Request Smuggling? Upgrade | [3.1.0.Beta1,3.5.0.CR1)[,3.0.25.Final) |
org.jboss.resteasy:resteasy-jaxrs is a JCP specification that provides a Java API for RESTful Web Services over the HTTP protocol. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It was found that the default exception handler in RESTEasy did not properly validate user input. How to fix Cross-site Scripting (XSS)? Upgrade | [0,3.0.20.Final)[3.1.0.Beta1,3.1.0.CR1) |
org.jboss.resteasy:resteasy-jaxrs is a JCP specification that provides a Java API for RESTful Web Services over the HTTP protocol. Affected versions of this package are vulnerable to Information Exposure. It allows remote authenticated users to obtain sensitive information by leveraging insufficient use of random values in async jobs. How to fix Information Exposure? Upgrade | [,3.1.0.CR1) |