Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-20289

Опубликовано: 26 мар. 2021
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 5.3

Описание

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

РелизСтатусПримечание
bionic

DNE

devel

needed

esm-apps/focal

released

3.6.2-2ubuntu0.20.04.1~esm1
esm-apps/jammy

released

3.6.2-2ubuntu0.22.04.1~esm1
esm-apps/noble

released

3.6.2-2ubuntu0.24.04.1~esm1
esm-apps/xenial

released

3.0.6-3ubuntu0.1~esm1
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

ignored

end of life
hirsute

ignored

end of life

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needed

esm-apps/bionic

released

3.0.26-1~18.04.1~esm1
esm-apps/focal

released

3.0.26-1ubuntu0.1~esm1
esm-apps/jammy

released

3.0.26-3ubuntu0.1
esm-apps/noble

released

3.0.26-6ubuntu0.24.04.1
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

ignored

end of life
hirsute

ignored

end of life

Показывать по

EPSS

Процентиль: 25%
0.00084
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 4 лет назад

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 5.3
nvd
больше 4 лет назад

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 5.3
debian
больше 4 лет назад

A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.F ...

CVSS3: 5.3
github
больше 4 лет назад

Exposure of class information in RESTEasy

CVSS3: 5.3
fstec
больше 4 лет назад

Уязвимость программного средства RESTEasy, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 25%
0.00084
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3