GSD-2020-10688
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-10688",
"description": "A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.",
"id": "GSD-2020-10688",
"references": [
"https://access.redhat.com/errata/RHSA-2021:3140",
"https://access.redhat.com/errata/RHSA-2020:3806",
"https://access.redhat.com/errata/RHSA-2020:2905",
"https://access.redhat.com/errata/RHSA-2020:2515",
"https://access.redhat.com/errata/RHSA-2020:2513",
"https://access.redhat.com/errata/RHSA-2020:2512",
"https://access.redhat.com/errata/RHSA-2020:2511",
"https://access.redhat.com/errata/RHSA-2020:2333"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-10688"
],
"details": "A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.",
"id": "GSD-2020-10688",
"modified": "2023-12-13T01:22:04.419055Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2020-10688",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RESTEasy",
"version": {
"version_data": [
{
"version_value": "resteasy 3.11.1.Final, resteasy 4.5.3.Final"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974"
},
{
"name": "https://github.com/quarkusio/quarkus/issues/7248",
"refsource": "MISC",
"url": "https://github.com/quarkusio/quarkus/issues/7248"
},
{
"name": "https://issues.redhat.com/browse/RESTEASY-2519",
"refsource": "MISC",
"url": "https://issues.redhat.com/browse/RESTEASY-2519"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210706-0008/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210706-0008/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,3.11.0.Final],[4.0.0,4.5.2.Final]",
"affected_versions": "All versions up to 3.11.0.final, all versions starting from 4.0.0 up to 4.5.2.final",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-707",
"CWE-79",
"CWE-937"
],
"date": "2021-06-15",
"description": "A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.",
"fixed_versions": [
"3.11.1.Final",
"4.5.3.Final"
],
"identifier": "CVE-2020-10688",
"identifiers": [
"GHSA-29qj-rvv6-qrmv",
"CVE-2020-10688"
],
"not_impacted": "All versions after 3.11.0.final before 4.0.0, all versions after 4.5.2.final",
"package_slug": "maven/org.jboss.resteasy/resteasy-bom",
"pubdate": "2021-06-15",
"solution": "Upgrade to versions 3.11.1.Final, 4.5.3.Final or above.",
"title": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-10688",
"https://github.com/quarkusio/quarkus/issues/7248",
"https://github.com/advisories/GHSA-29qj-rvv6-qrmv"
],
"uuid": "3a50e9d1-e2b4-45a8-a00d-6d2a6ca607ae"
},
{
"affected_range": "(,3.11.0.Final],[4.0.0,4.5.2.Final]",
"affected_versions": "All versions up to 3.11.0.final, all versions starting from 4.0.0 up to 4.5.2.final",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-707",
"CWE-79",
"CWE-937"
],
"date": "2021-06-15",
"description": "A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.",
"fixed_versions": [
"3.11.1.Final",
"4.5.3.Final"
],
"identifier": "CVE-2020-10688",
"identifiers": [
"GHSA-29qj-rvv6-qrmv",
"CVE-2020-10688"
],
"not_impacted": "All versions after 3.11.0.final before 4.0.0, all versions after 4.5.2.final",
"package_slug": "maven/org.jboss.resteasy/resteasy-core",
"pubdate": "2021-06-15",
"solution": "Upgrade to versions 3.11.1.Final, 4.5.3.Final or above.",
"title": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-10688",
"https://github.com/quarkusio/quarkus/issues/7248",
"https://bugzilla.redhat.com/show_bug.cgi?id=1814974",
"https://issues.redhat.com/browse/RESTEASY-2519",
"https://github.com/advisories/GHSA-29qj-rvv6-qrmv"
],
"uuid": "5dd25290-ba1d-4f57-ba42-282f7a9ca872"
},
{
"affected_range": "(,3.11.1),[4.5.0,4.5.3)",
"affected_versions": "All versions before 3.11.1, all versions starting from 4.5.0 before 4.5.3",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-79",
"CWE-937"
],
"date": "2021-07-06",
"description": "A cross-site scripting (XSS) flaw was found in RESTEasy where it does not properly handle URL encoding when the `RESTEASY003870` exception occurs. An attacker could use this flaw to launch a reflected XSS attack.",
"fixed_versions": [
"3.11.1.Final",
"4.5.3"
],
"identifier": "CVE-2020-10688",
"identifiers": [
"CVE-2020-10688"
],
"not_impacted": "All versions starting from 3.11.1 before 4.5.0, all versions starting from 4.5.3",
"package_slug": "maven/org.jboss.resteasy/resteasy-jaxrs",
"pubdate": "2021-05-27",
"solution": "Upgrade to version 3.11.1.Final, 4.5.3 or above.",
"title": "Cross-site Scripting",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-10688",
"https://bugzilla.redhat.com/show_bug.cgi?id=1814974",
"https://github.com/quarkusio/quarkus/issues/7248",
"https://issues.redhat.com/browse/RESTEASY-2519"
],
"uuid": "f39005fa-0eaf-4631-a779-10ff5d3fee01"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.5.3",
"versionStartIncluding": "4.5.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.11.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2020-10688"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974"
},
{
"name": "https://github.com/quarkusio/quarkus/issues/7248",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/quarkusio/quarkus/issues/7248"
},
{
"name": "https://issues.redhat.com/browse/RESTEASY-2519",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://issues.redhat.com/browse/RESTEASY-2519"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210706-0008/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210706-0008/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2022-05-13T20:47Z",
"publishedDate": "2021-05-27T19:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…