{"containers":{"cna":{"affected":[{"product":"RESTEasy","vendor":"n/a","versions":[{"status":"affected","version":"All versions of RESTEasy up to 4.6.0.Final"}]}],"descriptions":[{"lang":"en","value":"A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-07-27T15:06:33.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1942819"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20210727-0005/"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:37:24.125Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1942819"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20210727-0005/"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2021-20293","datePublished":"2021-06-10T11:09:47.000Z","dateReserved":"2020-12-17T00:00:00.000Z","dateUpdated":"2024-08-03T17:37:24.125Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}