CVE-2020-25633

A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-18 19:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-25633

Mitre link : CVE-2020-25633

CVE.ORG link : CVE-2020-25633


JSON object : View

Products Affected

redhat

  • resteasy

quarkus

  • quarkus
CWE
CWE-209

Generation of Error Message Containing Sensitive Information