Vulnerability Name: | CVE-2020-25724 (CCN-202602) | ||||||||||||
Assigned: | 2020-11-18 | ||||||||||||
Published: | 2020-11-18 | ||||||||||||
Updated: | 2022-05-13 | ||||||||||||
Summary: | A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected. | ||||||||||||
CVSS v3 Severity: | 4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) 3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
3.7 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-567 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-25724 Source: CCN Type: Red Hat Bugzilla Bug 1899354 (CVE-2020-25724) - CVE-2020-25724 resteasy: information disclosure via HTTP response reuse Source: MISC Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1899354 Source: XF Type: UNKNOWN resteasy-cve202025724-info-disc(202602) Source: CCN Type: RESTEasy GIT Repository RESTEasy Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210702-0003/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |