logo

CVE-2020-1695 org.jboss.resteasy:resteasy-client

Package

Manager: maven
Name: org.jboss.resteasy:resteasy-client
Vulnerable Version: >=4.0.0 <4.6.0 || >=3.0.0 <3.12.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00751 pctl0.72249

Details

Improper Input Validation in RESTEasy A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.

Metadata

Created: 2022-05-24T22:01:21Z
Modified: 2022-06-24T01:25:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-63cq-ppq8-cw6g/GHSA-63cq-ppq8-cw6g.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-63cq-ppq8-cw6g
Finding: F184
Auto approve: 1