icon

We found results for “

CVE-2024-1726

Good to know:

icon
icon

Date: April 25, 2024

A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Improper Preservation of Permissions

CWE-281

Top Fix

icon

Upgrade Version

Upgrade to version io.quarkus:quarkus-resteasy-reactive:3.2.11.Final,3.7.4,3.8.0, io.quarkus.resteasy.reactive:resteasy-reactive-processor:3.2.11.Final,3.7.4,3.8.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): LOW

Do you need more information?

Contact Us