Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-59044 | Due to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response. |
Solution
For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised inĀ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/
Workaround
No workaround given by the vendor.
Tue, 08 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2024-10-08T14:14:43.216Z
Reserved: 2023-12-15T10:13:25.068Z
Link: CVE-2023-6839
Updated: 2024-08-02T08:42:07.511Z
Status : Modified
Published: 2023-12-15T11:15:48.003
Modified: 2024-11-21T08:44:39.303
Link: CVE-2023-6839
No data.
OpenCVE Enrichment
No data.
EUVD