CVE-2020-1695 – org.jboss.resteasy:resteasy-client
Package
Manager: maven
Name: org.jboss.resteasy:resteasy-client
Vulnerable Version: >=4.0.0 <4.6.0 || >=3.0.0 <3.12.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00751 pctl0.72249
Details
Improper Input Validation in RESTEasy A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
Metadata
Created: 2022-05-24T22:01:21Z
Modified: 2022-06-24T01:25:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-63cq-ppq8-cw6g/GHSA-63cq-ppq8-cw6g.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-63cq-ppq8-cw6g
Finding: F184
Auto approve: 1