A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
References
Configurations
History
07 Nov 2023, 03:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
01 Jan 2022, 17:33
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1695 - Issue Tracking, Patch, Vendor Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RX22C6I56BJUER76IIPYHGZIWBQIU3CQ/ - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJDMT443YZWCBS5NS76XZ7TL3GK7BXHL/ - Third Party Advisory | |
CWE | NVD-CWE-Other | |
First Time |
Fedoraproject fedora
Fedoraproject |
|
CPE | cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* |
Information
Published : 2020-05-19 15:15
Updated : 2023-12-10 13:27
NVD link : CVE-2020-1695
Mitre link : CVE-2020-1695
CVE.ORG link : CVE-2020-1695
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- resteasy
CWE