Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhyMzItbWdwbS1xZjJm

Generation of Error Message Containing Sensitive Information in RESTEasy client

A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.

Permalink: https://github.com/advisories/GHSA-hr32-mgpm-qf2f
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhyMzItbWdwbS1xZjJm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago


CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-hr32-mgpm-qf2f, CVE-2020-25633
References: Repository: https://github.com/resteasy/Resteasy
Blast Radius: 20.1

Affected Packages

maven:org.jboss.resteasy:resteasy-client-microprofile
Dependent packages: 37
Dependent repositories: 189
Downloads:
Affected Version Ranges: <= 3.13.2.Final, >= 4.0.0, <= 4.5.6.Final
Fixed in: 3.14.0.Final, 4.5.7.Final
All affected versions:
All unaffected versions:
maven:org.jboss.resteasy:resteasy-client
Dependent packages: 721
Dependent repositories: 6,292
Downloads:
Affected Version Ranges: <= 3.13.2.Final, >= 4.0.0, <= 4.5.6.Final
Fixed in: 3.14.0.Final, 4.5.7.Final
All affected versions:
All unaffected versions: