CVE-2020-25724

A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
VendorProductVersion
redhatresteasy
𝑥
< 2.0.0
redhatresteasy
2.0.0:alpha1
redhatresteasy
2.0.0:alpha2
quarkusquarkus
𝑥
< 1.11.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
resteasy
sid
3.6.2-2
fixed
resteasy3.0
bullseye
3.0.26-2
fixed
sid
3.0.26-6
fixed
trixie
3.0.26-6
fixed
bookworm
3.0.26-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
resteasy
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
groovy
ignored
focal
needs-triage
bionic
dne
xenial
needs-triage
trusty
dne
resteasy3.0
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
groovy
ignored
focal
needs-triage
bionic
needs-triage
xenial
dne
trusty
dne