Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-4853

Опубликовано: 08 сент. 2023
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.

Меры по смягчению последствий

Use a ‘deny’ wildcard for base paths, then authenticate specifics within that: Examples:

deny: /* authenticated: /services/*

or

deny: /services/* roles-allowed: /services/rbac/*

NOTE: Products are only vulnerable if they use (or allow use of) path-based HTTP policy configuration. Products may also be affected–shipping the component in question–without being vulnerable (“affected at reduced impact”). See https://access.redhat.com/security/vulnerabilities/RHSB-2023-002 for more detailed mitigations.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Process Automation 7quarkus-vertx-httpWill not fix
Openshift Serverless 1 on RHEL 8openshift-serverless-clientsFixedRHSA-2023:547905.10.2023
Red Hat build of OptaPlanner 8quarkus-vertx-httpFixedRHSA-2023:544604.10.2023
Red Hat build of Quarkus 2.13.8.SP2io.quarkus/quarkus-keycloak-authorizationFixedRHSA-2023:517014.09.2023
Red Hat build of Quarkus 2.13.8.SP2io.quarkus/quarkus-undertowFixedRHSA-2023:517014.09.2023
Red Hat build of Quarkus 2.13.8.SP2io.quarkus/quarkus-vertx-httpFixedRHSA-2023:517014.09.2023
Red Hat Camel Extensions for Quarkus 2.13.3-1quarkus-vertx-httpFixedRHSA-2023:531020.09.2023
Red Hat OpenShift Serverless 1.30openshift-serverless-1/client-kn-rhel8FixedRHSA-2023:548005.10.2023
Red Hat OpenShift Serverless 1.30openshift-serverless-1/ingress-rhel8-operatorFixedRHSA-2023:548005.10.2023
Red Hat OpenShift Serverless 1.30openshift-serverless-1/knative-rhel8-operatorFixedRHSA-2023:548005.10.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-148
https://bugzilla.redhat.com/show_bug.cgi?id=2238034quarkus: HTTP security policy bypass

EPSS

Процентиль: 57%
0.00348
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 2 лет назад

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.

CVSS3: 8.1
github
больше 2 лет назад

Quarkus HTTP vulnerable to incorrect evaluation of permissions

CVSS3: 8.1
fstec
больше 2 лет назад

Уязвимость политики безопасности HTTP Java-фреймворка Quarkus, позволяющая нарушителю обойти ограничения безопасности, получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании

EPSS

Процентиль: 57%
0.00348
Низкий

8.1 High

CVSS3