Overview
- Description
- A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27485916-36BB-4E37-BA15-97F6B349AE76", "versionEndExcluding": "3.14.0" }, { "criteria": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E5E7D12-6900-4E56-BA10-EE19CF8BD9C3", "versionEndIncluding": "4.5.6", "versionStartIncluding": "4.5.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9495583C-505E-4AAB-BE79-1EBAC1DB247B", "versionEndIncluding": "1.11.6" } ], "operator": "OR" } ] } ]