CVE-2024-12397: io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling
A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.
References
- access.redhat.com/security/cve/CVE-2024-12397
- bugzilla.redhat.com/show_bug.cgi?id=2331298
- github.com/advisories/GHSA-cxrx-q234-m22m
- github.com/quarkusio/quarkus-http
- github.com/quarkusio/quarkus-http/commit/cfc99d80fce2e3a3dbf06972e648e79e925a7ae7
- github.com/quarkusio/quarkus-http/pull/170
- nvd.nist.gov/vuln/detail/CVE-2024-12397
Detect and mitigate CVE-2024-12397 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →