CVE Vulnerabilities

CVE-2020-25724

Unsynchronized Access to Shared Data in a Multithreaded Context

Published: May 26, 2021 | Modified: May 13, 2022
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.

Weakness

The product does not properly synchronize shared data, such as static variables across threads, which can lead to undefined behavior and unpredictable data changes.

Affected Software

Name Vendor Start Version End Version
Resteasy Redhat * 2.0.0 (excluding)
Resteasy Redhat 2.0.0-alpha1 (including) 2.0.0-alpha1 (including)
Resteasy Redhat 2.0.0-alpha2 (including) 2.0.0-alpha2 (including)

Extended Description

Within servlets, shared static variables are not protected from concurrent access, but servlets are multithreaded. This is a typical programming mistake in J2EE applications, since the multithreading is handled by the framework. When a shared variable can be influenced by an attacker, one thread could wind up modifying the variable to contain data that is not valid for a different thread that is also using the data within the variable. Note that this weakness is not unique to servlets.

Potential Mitigations

References