Upstream information
CVE-2020-1695 at MITRE
Description
A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
CVSS v2 Scores
| National Vulnerability Database |
Base Score | 5 |
Vector | AV:N/AC:L/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
CVSS v3 Scores
| National Vulnerability Database |
Base Score | 7.5 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | None |
Integrity Impact | High |
Availability Impact | None |
CVSSv3 Version | 3.1 |
SUSE Bugzilla entry:
1172141 [NEW]
No SUSE Security Announcements cross referenced.
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE Liberty Linux 8 | apache-commons-collections >= 3.2.2-10.module+el8.1.0+3366+6dfb954c
apache-commons-lang >= 2.6-21.module+el8.1.0+3366+6dfb954c
apache-commons-net >= 3.6-3.module+el8.3.0+6805+72837426
bea-stax-api >= 1.2.0-16.module+el8.1.0+3366+6dfb954c
glassfish-fastinfoset >= 1.2.13-9.module+el8.1.0+3366+6dfb954c
glassfish-jaxb-api >= 2.2.12-8.module+el8.1.0+3366+6dfb954c
glassfish-jaxb-core >= 2.2.11-11.module+el8.1.0+3366+6dfb954c
glassfish-jaxb-runtime >= 2.2.11-11.module+el8.1.0+3366+6dfb954c
glassfish-jaxb-txw2 >= 2.2.11-11.module+el8.1.0+3366+6dfb954c
jackson-annotations >= 2.10.0-1.module+el8.2.0+5059+3eb3af25
jackson-core >= 2.10.0-1.module+el8.2.0+5059+3eb3af25
jackson-databind >= 2.10.0-1.module+el8.2.0+5059+3eb3af25
jackson-jaxrs-json-provider >= 2.9.9-1.module+el8.1.0+3832+9784644d
jackson-jaxrs-providers >= 2.9.9-1.module+el8.1.0+3832+9784644d
jackson-module-jaxb-annotations >= 2.7.6-4.module+el8.1.0+3366+6dfb954c
jakarta-commons-httpclient >= 3.1-28.module+el8.1.0+3366+6dfb954c
javassist >= 3.18.1-8.module+el8.1.0+3366+6dfb954c
javassist-javadoc >= 3.18.1-8.module+el8.1.0+3366+6dfb954c
jss >= 4.8.1-2.module+el8.4.0+10451+3e5b5448
jss-javadoc >= 4.8.1-2.module+el8.4.0+10451+3e5b5448
ldapjdk >= 4.22.0-1.module+el8.3.0+6784+6e1e4c62
ldapjdk-javadoc >= 4.22.0-1.module+el8.3.0+6784+6e1e4c62
pki-acme >= 10.10.5-2.module+el8.4.0+10466+9830f79e
pki-base >= 10.10.5-2.module+el8.4.0+10466+9830f79e
pki-base-java >= 10.10.5-2.module+el8.4.0+10466+9830f79e
pki-ca >= 10.10.5-2.module+el8.4.0+10466+9830f79e
pki-kra >= 10.10.5-2.module+el8.4.0+10466+9830f79e
pki-server >= 10.10.5-2.module+el8.4.0+10466+9830f79e
pki-servlet-4.0-api >= 9.0.30-1.module+el8.3.0+6730+8f9c6254
pki-servlet-engine >= 9.0.30-1.module+el8.3.0+6730+8f9c6254
pki-symkey >= 10.10.5-2.module+el8.4.0+10466+9830f79e
pki-tools >= 10.10.5-2.module+el8.4.0+10466+9830f79e
python-nss-doc >= 1.0.1-10.module+el8.1.0+3366+6dfb954c
python3-nss >= 1.0.1-10.module+el8.1.0+3366+6dfb954c
python3-pki >= 10.10.5-2.module+el8.4.0+10466+9830f79e
relaxngDatatype >= 2011.1-7.module+el8.1.0+3366+6dfb954c
resteasy >= 3.0.26-6.module+el8.4.0+8891+bb8828ef
slf4j >= 1.7.25-4.module+el8.1.0+3366+6dfb954c
slf4j-jdk14 >= 1.7.25-4.module+el8.1.0+3366+6dfb954c
stax-ex >= 1.7.7-8.module+el8.2.0+5723+4574fbff
tomcatjss >= 7.6.1-1.module+el8.4.0+8778+d07929ff
velocity >= 1.7-24.module+el8.1.0+3366+6dfb954c
xalan-j2 >= 2.7.1-38.module+el8.1.0+3366+6dfb954c
xerces-j2 >= 2.11.0-34.module+el8.1.0+3366+6dfb954c
xml-commons-apis >= 1.4.01-25.module+el8.1.0+3366+6dfb954c
xml-commons-resolver >= 1.2-26.module+el8.1.0+3366+6dfb954c
xmlstreambuffer >= 1.5.4-8.module+el8.2.0+5723+4574fbff
xsom >= 0-19.20110809svn.module+el8.1.0+3366+6dfb954c
| Patchnames: RHSA-2021:1775 |
SUSE Timeline for this CVE
CVE page created: Wed Apr 15 07:54:16 2020
CVE page last modified: Mon Oct 30 18:06:46 2023