CVE-2023-4853: Quarkus HTTP vulnerable to incorrect evaluation of permissions
(updated )
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
References
- access.redhat.com/errata/RHSA-2023:5170
- access.redhat.com/errata/RHSA-2023:5310
- access.redhat.com/errata/RHSA-2023:5337
- access.redhat.com/security/cve/CVE-2023-4853
- access.redhat.com/security/vulnerabilities/RHSB-2023-002
- bugzilla.redhat.com/show_bug.cgi?id=2238034
- github.com/advisories/GHSA-4f4r-wgv2-jjvg
- github.com/quarkusio/quarkus/discussions/35940
- github.com/quarkusio/quarkus/issues/35785
- nvd.nist.gov/vuln/detail/CVE-2023-4853
Detect and mitigate CVE-2023-4853 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →