We found results for “”
CVE-2024-1726
Good to know:
Date: April 25, 2024
A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.
Language: Java
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Improper Preservation of Permissions
CWE-281Top Fix
Upgrade Version
Upgrade to version io.quarkus:quarkus-resteasy-reactive:3.2.11.Final,3.7.4,3.8.0, io.quarkus.resteasy.reactive:resteasy-reactive-processor:3.2.11.Final,3.7.4,3.8.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | LOW |