CVE-2020-25724 in Red Hat and Quarkus Products
Published on May 26, 2021
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
Weakness Type
Unsynchronized Access to Shared Data in a Multithreaded Context
The product does not properly synchronize shared data, such as static variables across threads, which can lead to undefined behavior and unpredictable data changes.
Products Associated with CVE-2020-25724
stack.watch emails you whenever new vulnerabilities are published in Red Hat Resteasy or Quarkus. Just hit a watch button to start following.
Exploit Probability
EPSS
0.13%
Percentile
32.43%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.