CVE-2020-25633
resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Se encontró un fallo en el cliente RESTEasy en todas las versiones de RESTEasy hasta 4.5.6.Final. Puede permitir a usuarios del cliente obtener información potencialmente confidencial del servidor cuando el servidor obtuvo una WebApplicationException de la llamada del cliente RESTEasy. La mayor amenaza de esta vulnerabilidad es la confidencialidad de los datos
A flaw was found in the RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. This flaw allows client users to obtain the server's potentially sensitive information when the server receives the WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to confidentiality.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-16 CVE Reserved
- 2020-09-18 CVE Published
- 2023-06-04 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-209: Generation of Error Message Containing Sensitive Information
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2020-25633 | 2021-08-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1879042 | 2021-08-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Resteasy Search vendor "Redhat" for product "Resteasy" | < 3.14.0 Search vendor "Redhat" for product "Resteasy" and version " < 3.14.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Resteasy Search vendor "Redhat" for product "Resteasy" | >= 4.5.0 <= 4.5.6 Search vendor "Redhat" for product "Resteasy" and version " >= 4.5.0 <= 4.5.6" | - |
Affected
| ||||||
Quarkus Search vendor "Quarkus" | Quarkus Search vendor "Quarkus" for product "Quarkus" | <= 1.11.6 Search vendor "Quarkus" for product "Quarkus" and version " <= 1.11.6" | - |
Affected
|