Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhyMzItbWdwbS1xZjJm
Generation of Error Message Containing Sensitive Information in RESTEasy client
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Permalink: https://github.com/advisories/GHSA-hr32-mgpm-qf2fJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhyMzItbWdwbS1xZjJm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-hr32-mgpm-qf2f, CVE-2020-25633
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-25633
- https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633
- https://issues.redhat.com/browse/RESTEASY-2820
- https://github.com/advisories/GHSA-hr32-mgpm-qf2f
Blast Radius: 20.1
Affected Packages
maven:org.jboss.resteasy:resteasy-client-microprofile
Dependent packages: 37Dependent repositories: 189
Downloads:
Affected Version Ranges: <= 3.13.2.Final, >= 4.0.0, <= 4.5.6.Final
Fixed in: 3.14.0.Final, 4.5.7.Final
All affected versions:
All unaffected versions:
maven:org.jboss.resteasy:resteasy-client
Dependent packages: 721Dependent repositories: 6,292
Downloads:
Affected Version Ranges: <= 3.13.2.Final, >= 4.0.0, <= 4.5.6.Final
Fixed in: 3.14.0.Final, 4.5.7.Final
All affected versions:
All unaffected versions: