CVE-2020-25724

CWE-5677 documents6 sources
Severity
4.3MEDIUM
EPSS
0.1%
top 67.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 26
Latest updateJun 8

Description

A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages6 packages

NVDredhat/resteasy< 2.0.0+1
Ubunturesteasy< 3.6.2-2+2
Ubunturesteasy3.0< 3.0.26-1+2
CVEListV5resteasyresteasy 2.0.0.Alpha3

🔴Vulnerability Details

4
GHSA
Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy2021-06-08
OSV
Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy2021-06-08
CVEList
CVE-2020-25724: A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided2021-05-26
OSV
CVE-2020-25724: A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided2021-05-26

📋Vendor Advisories

2
Red Hat
resteasy: information disclosure via HTTP response reuse2020-11-16
Debian
CVE-2020-25724: resteasy - A flaw was found in RESTEasy, where an incorrect response to an HTTP request is ...2020
CVE-2020-25724 (MEDIUM CVSS 4.3) | A flaw was found in RESTEasy | cvebase.io