Bug 1372124 (CVE-2016-6347) - CVE-2016-6347 RESTEasy: Use of the default exception handler in RESTEasy can lead to reflected XSS attack
Summary: CVE-2016-6347 RESTEasy: Use of the default exception handler in RESTEasy can ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-6347
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1372125 1471277 1471278 1590941 1914372
Blocks: 1371804 1372141 1372565 1372568 1372571
TreeView+ depends on / blocked
 
Reported: 2016-09-01 01:09 UTC by Jason Shepherd
Modified: 2021-12-14 18:47 UTC (History)
82 users (show)

Fixed In Version: resteasy 3.1.0.CR1, resteasy 3.0.20.Final
Doc Type: If docs needed, set a value
Doc Text:
It was found that the default exception handler in RESTEasy did not properly validate user input. An attacker could use this flaw to launch a relected XSS attack.
Clone Of:
Environment:
Last Closed: 2021-10-21 00:54:45 UTC
Embargoed:


Attachments (Terms of Use)

Description Jason Shepherd 2016-09-01 01:09:47 UTC
It was found that the default exception handler in RESTEasy did not properly validate user input. An attacker could use this flaw to launch a relected XSS attack.

Comment 1 Jason Shepherd 2016-09-01 01:09:51 UTC
Acknowledgments:

Name: Mikhail Egorov (Odin)

Comment 2 Jason Shepherd 2016-09-01 01:11:11 UTC
Created resteasy tracking bugs for this issue:

Affects: fedora-all [bug 1372125]

Comment 6 Kurt Seifried 2017-07-14 21:15:54 UTC
Created resteasy tracking bugs for this issue:

Affects: fedora-all [bug 1471277]

Comment 9 Kurt Seifried 2018-06-13 16:58:44 UTC
Statement:

This issue affects the versions of RESTEasy as shipped with Red Hat Satellite 6. Red Hat Product Security has rated this issue as having a security impact of Moderate. Additionally Red Hat Satellite does not use the default ExceptionMapper, and the custom exception handler does not allow return type of text/html. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 10 Kurt Seifried 2018-06-13 16:59:35 UTC
Created resteasy tracking bugs for this issue:

Affects: fedora-all [bug 1590941]

Comment 11 Dinesh Prasanth 2019-10-21 19:40:55 UTC
The reported issue has been fixed by rebasing to resteasy 3.0.26

Rawhide/f32: https://koji.fedoraproject.org/koji/buildinfo?buildID=1403302
F31: https://koji.fedoraproject.org/koji/buildinfo?buildID=1403312
F30: https://koji.fedoraproject.org/koji/buildinfo?buildID=1403309

Closing this bug as CURRENTRELEASE


Note You need to log in before you can comment on or make changes to this bug.