Vulnerability Name: | CVE-2020-10688 (CCN-202700) | ||||||||||||
Assigned: | 2020-03-19 | ||||||||||||
Published: | 2020-03-19 | ||||||||||||
Updated: | 2022-05-13 | ||||||||||||
Summary: | A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack. | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
4.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-10688 Source: CCN Type: Red Hat Bugzilla Bug 1814974 (CVE-2020-10688) - CVE-2020-10688 RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack Source: MISC Type: Issue Tracking, Patch, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1814974 Source: XF Type: UNKNOWN resteasy-cve202010688-xss(202700) Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/quarkusio/quarkus/issues/7248 Source: MISC Type: Issue Tracking, Permissions Required, Vendor Advisory https://issues.redhat.com/browse/RESTEASY-2519 Source: CCN Type: RESTEasy GIT Repository RESTEasy Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210706-0008/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-10688 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |