Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-12397

Опубликовано: 10 дек. 2024
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.

Отчет

Red Hat has evaluated this vulnerability. This is a very similar vulnerability to an Undertow, seen in CVE-2023-4639. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.

Меры по смягчению последствий

Currently, no mitigation is available for this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 3io.quarkus.http/quarkus-http-coreAffected
Red Hat build of Apache Camel 4 for Quarkus 3com.redhat.quarkus.platform/quarkus-camel-bomAffected
Red Hat build of Apache Camel 4 for Quarkus 3com.redhat.quarkus.platform/quarkus-cxf-bomAffected
Red Hat build of Apicurio Registry 2io.quarkus.http/quarkus-http-coreAffected
Red Hat Build of Keycloakio.quarkus.http/quarkus-http-coreAffected
Red Hat build of OptaPlanner 8io.quarkus.http/quarkus-http-coreWill not fix
Red Hat Fuse 7io.quarkus.http/quarkus-http-coreOut of support scope
Red Hat Integration Camel K 1io.quarkus.http/quarkus-http-coreAffected
Red Hat JBoss Enterprise Application Platform 8io.quarkus.http/quarkus-http-coreNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packio.quarkus.http/quarkus-http-coreNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2331298io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling

EPSS

Процентиль: 61%
0.00421
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
около 1 года назад

A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.

CVSS3: 7.4
github
около 1 года назад

io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling

EPSS

Процентиль: 61%
0.00421
Низкий

7.4 High

CVSS3