Bug 1899354 (CVE-2020-25724) - CVE-2020-25724 resteasy: information disclosure via HTTP response reuse
Summary: CVE-2020-25724 resteasy: information disclosure via HTTP response reuse
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-25724
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1898995
TreeView+ depends on / blocked
 
Reported: 2020-11-18 23:18 UTC by Chess Hazlett
Modified: 2021-05-26 13:26 UTC (History)
21 users (show)

Fixed In Version: resteasy 2.0.0.Alpha3
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity.
Clone Of:
Environment:
Last Closed: 2021-03-29 11:35:12 UTC
Embargoed:


Attachments (Terms of Use)

Description Chess Hazlett 2020-11-18 23:18:15 UTC
Under certain conditions and certain workloads, Resteasy can provide an incorrect response to an HTTP request. An attacker could use this to gain access to privileged information.

Comment 6 errata-xmlrpc 2021-03-29 11:12:58 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus

Via RHSA-2021:1004 https://access.redhat.com/errata/RHSA-2021:1004

Comment 7 Product Security DevOps Team 2021-03-29 11:35:12 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-25724


Note You need to log in before you can comment on or make changes to this bug.