vulnerability

CentOS Linux: CVE-2020-1695: Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (CESA-2021:1775)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
May 19, 2020
Added
Jun 1, 2021
Modified
May 25, 2023

Description

A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.

Solutions

centos-upgrade-apache-commons-collectionscentos-upgrade-apache-commons-langcentos-upgrade-apache-commons-netcentos-upgrade-bea-stax-apicentos-upgrade-glassfish-fastinfosetcentos-upgrade-glassfish-jaxb-apicentos-upgrade-glassfish-jaxb-corecentos-upgrade-glassfish-jaxb-runtimecentos-upgrade-glassfish-jaxb-txw2centos-upgrade-jackson-annotationscentos-upgrade-jackson-corecentos-upgrade-jackson-databindcentos-upgrade-jackson-jaxrs-json-providercentos-upgrade-jackson-jaxrs-providerscentos-upgrade-jackson-module-jaxb-annotationscentos-upgrade-jakarta-commons-httpclientcentos-upgrade-javassistcentos-upgrade-javassist-javadoccentos-upgrade-jsscentos-upgrade-jss-debuginfocentos-upgrade-jss-debugsourcecentos-upgrade-jss-javadoccentos-upgrade-ldapjdkcentos-upgrade-ldapjdk-javadoccentos-upgrade-pki-acmecentos-upgrade-pki-basecentos-upgrade-pki-base-javacentos-upgrade-pki-cacentos-upgrade-pki-core-debuginfocentos-upgrade-pki-core-debugsourcecentos-upgrade-pki-kracentos-upgrade-pki-servercentos-upgrade-pki-servlet-4-0-apicentos-upgrade-pki-servlet-enginecentos-upgrade-pki-symkeycentos-upgrade-pki-symkey-debuginfocentos-upgrade-pki-toolscentos-upgrade-pki-tools-debuginfocentos-upgrade-python-nss-debugsourcecentos-upgrade-python-nss-doccentos-upgrade-python3-nsscentos-upgrade-python3-nss-debuginfocentos-upgrade-python3-pkicentos-upgrade-relaxngdatatypecentos-upgrade-resteasycentos-upgrade-slf4jcentos-upgrade-slf4j-jdk14centos-upgrade-stax-excentos-upgrade-tomcatjsscentos-upgrade-velocitycentos-upgrade-xalan-j2centos-upgrade-xerces-j2centos-upgrade-xml-commons-apiscentos-upgrade-xml-commons-resolvercentos-upgrade-xmlstreambuffercentos-upgrade-xsom
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.