CVE-2021-20289 – org.jboss.resteasy:resteasy-core
Package
Manager: maven
Name: org.jboss.resteasy:resteasy-core
Vulnerable Version: >=4.6.0 <4.6.1 || >=4.0.0 <4.5.10 || >=3.0.0 <3.16.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00084 pctl0.25343
Details
Exposure of class information in RESTEasy A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
Metadata
Created: 2021-04-07T21:51:33Z
Modified: 2022-04-22T15:49:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-244r-fcj3-ghjq/GHSA-244r-fcj3-ghjq.json
CWE IDs: ["CWE-209", "CWE-668"]
Alternative ID: GHSA-244r-fcj3-ghjq
Finding: F037
Auto approve: 1