7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
resteasy-jaxrs is vulnerble to improper input validation. The attack exists because it does not properly handle the response headers in MediaTypeHeaderDelegate.java
, leading to a return of an illegal header to be integrated in the server’s response.
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1695
github.com/resteasy/Resteasy/pull/2352
issues.redhat.com/browse/RESTEASY-2559
lists.fedoraproject.org/archives/list/[email protected]/message/IJDMT443YZWCBS5NS76XZ7TL3GK7BXHL/
lists.fedoraproject.org/archives/list/[email protected]/message/RX22C6I56BJUER76IIPYHGZIWBQIU3CQ/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N