mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.6 KiB
JSON
77 lines
2.6 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-10688",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "RESTEasy",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "resteasy 3.11.1.Final, resteasy 4.5.3.Final"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/quarkusio/quarkus/issues/7248",
|
|
"url": "https://github.com/quarkusio/quarkus/issues/7248"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://issues.redhat.com/browse/RESTEASY-2519",
|
|
"url": "https://issues.redhat.com/browse/RESTEASY-2519"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://security.netapp.com/advisory/ntap-20210706-0008/",
|
|
"url": "https://security.netapp.com/advisory/ntap-20210706-0008/"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack."
|
|
}
|
|
]
|
|
}
|
|
} |