Description A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
CVSS vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Exploitability: 2.8 | Impact: 1.4 Attack Vector: Network
Complexity: Low
Privileges: Low
User Interaction: None
Scope: Unchanged
Confidentiality: Low
Integrity: None
Availability: None
Affected Packages6 packages Show 1 more packages
🔴 Vulnerability Details4 GHSA Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy ↗ 2021-06-08 ▶ OSV Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy ↗ 2021-06-08 ▶ CVEList CVE-2020-25724: A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided ↗ 2021-05-26 ▶ OSV CVE-2020-25724: A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided ↗ 2021-05-26 ▶
📋 Vendor Advisories2 Red Hat resteasy: information disclosure via HTTP response reuse ↗ 2020-11-16 ▶ Debian CVE-2020-25724: resteasy - A flaw was found in RESTEasy, where an incorrect response to an HTTP request is ... ↗ 2020 ▶