{ "id": "CVE-2020-1729", "sourceIdentifier": "secalert@redhat.com", "published": "2021-05-28T14:15:07.733", "lastModified": "2021-06-08T15:41:22.337", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2" }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en la API de SmallRye versiones hasta 1.6.1. La API puede permitir a otro c\u00f3digo ejecutarse dentro del servidor de aplicaciones para obtener potencialmente el ClassLoader, omitiendo las comprobaciones de permisos que deber\u00edan haberse aplicado. La mayor amenaza de esta vulnerabilidad es una amenaza a la confidencialidad de los datos. Esto es corregido en SmallRye versi\u00f3n 1.6.2" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 0.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-863" } ] }, { "source": "secalert@redhat.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-863" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:smallrye_config:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.6.2", "matchCriteriaId": "0D5869FF-CAA3-4DA2-938A-9C5ABDF64B21" } ] } ] } ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444", "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ] } ] }