CVE-2020-25633

A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:18

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633 - Issue Tracking, Vendor Advisory

Information

Published : 2020-09-18 19:15

Updated : 2024-11-21 05:18


NVD link : CVE-2020-25633

Mitre link : CVE-2020-25633

CVE.ORG link : CVE-2020-25633


JSON object : View

Products Affected

quarkus

  • quarkus

redhat

  • resteasy
CWE
CWE-209

Generation of Error Message Containing Sensitive Information