CVE-2020-25633

NameCVE-2020-25633
DescriptionA flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs970585, 1014983

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
resteasy (PTS)jessie3.0.6-2vulnerable
sid3.6.2-3vulnerable
resteasy3.0 (PTS)buster3.0.26-1vulnerable
bullseye3.0.26-2vulnerable
sid, trixie, bookworm3.0.26-6vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
resteasysourcejessie(unfixed)end-of-life
resteasysource(unstable)(unfixed)970585
resteasy3.0source(unstable)(unfixed)1014983

Notes

[bookworm] - resteasy3.0 <ignored> (Minor issue)
[bullseye] - resteasy3.0 <ignored> (Minor issue)
[buster] - resteasy3.0 <ignored> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=1879042
https://issues.redhat.com/browse/RESTEASY-2721
https://issues.redhat.com/browse/RESTEASY-2728
https://issues.redhat.com/browse/RESTEASY-2781
Fixed in 3.11.3, 4.6.0, 3.14.0, 4.4.3, 3.5.9

Search for package or bug name: Reporting problems