CVE-2020-25633 – org.jboss.resteasy:resteasy-client
Package
Manager: maven
Name: org.jboss.resteasy:resteasy-client
Vulnerable Version: >=4.0.0 <4.5.7.final || >=0 <3.14.0.final
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00228 pctl0.45465
Details
Generation of Error Message Containing Sensitive Information in RESTEasy client A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Metadata
Created: 2021-06-03T23:41:34Z
Modified: 2021-06-03T23:33:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-hr32-mgpm-qf2f/GHSA-hr32-mgpm-qf2f.json
CWE IDs: ["CWE-209"]
Alternative ID: GHSA-hr32-mgpm-qf2f
Finding: F037
Auto approve: 1