Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-9606 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system resteasy-jettison-provider Operating systems & Components / Operating system package or component resteasy-atom-provider Operating systems & Components / Operating system package or component resteasy-jackson-provider Operating systems & Components / Operating system package or component resteasy-test Operating systems & Components / Operating system package or component resteasy-validator-provider-11 Operating systems & Components / Operating system package or component resteasy-yaml-provider Operating systems & Components / Operating system package or component resteasy-netty3 Operating systems & Components / Operating system package or component resteasy-jackson2-provider Operating systems & Components / Operating system package or component resteasy-multipart-provider Operating systems & Components / Operating system package or component resteasy-optional Operating systems & Components / Operating system package or component resteasy-core Operating systems & Components / Operating system package or component resteasy-jaxb-provider Operating systems & Components / Operating system package or component resteasy-json-p-provider Operating systems & Components / Operating system package or component resteasy-client Operating systems & Components / Operating system package or component resteasy-javadoc Operating systems & Components / Operating system package or component resteasy Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU6611
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-9606
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the target system.
The weakness exists due to improper parsing of user-supplied requests. A remote attacker can submit a specially crafted request, which when parsed by the YamlProvider feature of the affected application allows to execute arbitrary code with the permissions of the application using RESTEasy.
Successful exploitation of the vulnerability may result in full system compromise.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
resteasy-jettison-provider: before 3.0.19-2
resteasy-atom-provider: before 3.0.19-2
resteasy-jackson-provider: before 3.0.19-2
resteasy-test: before 3.0.19-2
resteasy-validator-provider-11: before 3.0.19-2
resteasy-yaml-provider: before 3.0.19-2
resteasy-netty3: before 3.0.19-2
resteasy-jackson2-provider: before 3.0.19-2
resteasy-multipart-provider: before 3.0.19-2
resteasy-optional: before 3.0.19-2
resteasy-core: before 3.0.19-2
resteasy-jaxb-provider: before 3.0.19-2
resteasy-json-p-provider: before 3.0.19-2
resteasy-client: before 3.0.19-2
resteasy-javadoc: before 3.0.19-2
resteasy: before 3.0.19-2
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1073
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.