Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-20289

Опубликовано: 03 мар. 2021
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6resteasy-jaxrsOut of support scope
Red Hat CodeReady Studio 12resteasy-jaxrsFix deferred
Red Hat Decision Manager 7resteasy-jaxrsNot affected
Red Hat Enterprise Linux 7resteasy-baseOut of support scope
Red Hat Enterprise Linux 8pki-deps:10.6/resteasyFix deferred
Red Hat Enterprise Linux 9resteasyAffected
Red Hat Fuse 7resteasy-coreAffected
Red Hat Integration Camel K 1resteasy-coreAffected
Red Hat JBoss BRMS 5resteasy-jaxrsOut of support scope
Red Hat JBoss BRMS 6resteasy-jaxrsOut of support scope

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-209
https://bugzilla.redhat.com/show_bug.cgi?id=1935927resteasy: Error message exposes endpoint class information

EPSS

Процентиль: 25%
0.00084
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 4 лет назад

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 5.3
nvd
больше 4 лет назад

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 5.3
debian
больше 4 лет назад

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.F ...

CVSS3: 5.3
github
больше 4 лет назад

Exposure of class information in RESTEasy

CVSS3: 5.3
fstec
больше 4 лет назад

Уязвимость программного средства RESTEasy, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 25%
0.00084
Низкий

5.3 Medium

CVSS3