Project Subscriptions
| Vendors | Products |
|---|---|
|
Quarkus
Subscribe
|
Quarkus
Subscribe
|
|
Redhat
Subscribe
|
Build Of Optaplanner
Subscribe
Build Of Quarkus
Subscribe
Camel K
Subscribe
Camel Quarkus
Subscribe
Decision Manager
Subscribe
Enterprise Linux
Subscribe
Integration Camel K
Subscribe
Integration Camel Quarkus
Subscribe
Integration Service Registry
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Middleware
Subscribe
Jboss Middleware Text-only Advisories
Subscribe
Openshift Container Platform
Subscribe
Openshift Serverless
Subscribe
Optaplanner
Subscribe
Process Automation Manager
Subscribe
Quarkus
Subscribe
Rhosemc
Subscribe
Serverless
Subscribe
Service Registry
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2416 | A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service. |
Github GHSA |
GHSA-4f4r-wgv2-jjvg | Quarkus HTTP vulnerable to incorrect evaluation of permissions |
Solution
No solution given by the vendor.
Workaround
Use a ‘deny’ wildcard for base paths, then authenticate specifics within that: Examples: ``` deny: /* authenticated: /services/* ``` or ``` deny: /services/* roles-allowed: /services/rbac/* ``` NOTE: Products are only vulnerable if they use (or allow use of) path-based HTTP policy configuration. Products may also be affected–shipping the component in question–without being vulnerable (“affected at reduced impact”). See https://access.redhat.com/security/vulnerabilities/RHSB-2023-002 for more detailed mitigations.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-07T10:17:29.266Z
Reserved: 2023-09-08T16:10:38.379Z
Link: CVE-2023-4853
No data.
Status : Modified
Published: 2023-09-20T10:15:14.947
Modified: 2024-11-21T08:36:06.910
Link: CVE-2023-4853
OpenCVE Enrichment
No data.
EUVD
Github GHSA