Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-6267

Опубликовано: 24 янв. 2024
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based security.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of OptaPlanner 8quarkus-resteasy-reactiveAffected
Red Hat Fuse 7resteasyNot affected
Red Hat Integration Camel K 1resteasy-coreFix deferred
Red Hat Integration Camel Quarkus 2quarkus-resteasy-reactiveNot affected
Red Hat build of Quarkus 2.13.9.Finalio.quarkus/quarkus-resteasyFixedRHSA-2024:049425.01.2024
Red Hat build of Quarkus 3.2.9.Finalio.quarkus/quarkus-resteasyFixedRHSA-2024:049525.01.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-755
https://bugzilla.redhat.com/show_bug.cgi?id=2251155quarkus: json payload getting processed prior to security checks when rest resources are used with annotations.

EPSS

Процентиль: 69%
0.00601
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
nvd
около 2 лет назад

A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based security.

CVSS3: 8.6
github
около 2 лет назад

Quarkus Improper Handling of Insufficient Permissions or Privileges and Improper Handling of Exceptional Conditions vulnerability

EPSS

Процентиль: 69%
0.00601
Низкий

8.6 High

CVSS3