CVE-2020-14326
Java vulnerability analysis and mitigation

Overview

A vulnerability was discovered in RESTEasy (CVE-2020-14326) where RootNode incorrectly caches routes. The vulnerability affects RESTEasy versions 4.2.0 through versions prior to 4.5.6. This security issue was first reported by Ben Manes from Vector (Red Hat Bugzilla).

Technical details

The vulnerability occurs when API calls are routed by RESTEasy, causing the cache to grow unbounded. Due to keys having the same hash code, each subsequent request becomes slower as more CPU time is spent searching and adding entries. While the MediaTypeHeaderDelegate protects itself using a fixed size cache (default of 200) that clears when exceeding the threshold, the RootNode cache remains unbounded and inaccessible. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD, NetApp Advisory).

Impact

When successfully exploited, this vulnerability can lead to a Denial of Service (DoS) condition. A simple load generator could exploit this to make the endpoint unresponsive, as each subsequent request gets progressively slower due to increased CPU time consumption (Red Hat Bugzilla).

Mitigation and workarounds

The vulnerability has been fixed in RESTEasy version 4.5.6.Final. Users are advised to upgrade to this version or later to address the issue. Red Hat Enterprise Linux 7 and 8 are not affected by this flaw, as they do not ship versions of RESTEasy that contain the vulnerable code (Red Hat Bugzilla).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management