logo

CVE-2020-25633 org.jboss.resteasy:resteasy-client

Package

Manager: maven
Name: org.jboss.resteasy:resteasy-client
Vulnerable Version: >=4.0.0 <4.5.7.final || >=0 <3.14.0.final

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00228 pctl0.45465

Details

Generation of Error Message Containing Sensitive Information in RESTEasy client A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.

Metadata

Created: 2021-06-03T23:41:34Z
Modified: 2021-06-03T23:33:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-hr32-mgpm-qf2f/GHSA-hr32-mgpm-qf2f.json
CWE IDs: ["CWE-209"]
Alternative ID: GHSA-hr32-mgpm-qf2f
Finding: F037
Auto approve: 1