Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-4853— Quarkus: http security policy bypass

CVSS 8.1 · High EPSS 0.46% · P64
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-4853

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Quarkus: http security policy bypass
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入起始符转义处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Quarkus 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Quarkus是一个用于编写 Java 应用程序的云原生 (Linux) 容器优先框架。 Quarkus 存在安全漏洞,该漏洞源于其中 HTTP 安全策略在接受请求时无法正确清理某些字符排列,从而导致权限评估不正确。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatOpenshift Serverless 1 on RHEL 8 0:1.9.2-3.el8 ~ * cpe:/a:redhat:serverless:1.0::el8
Red HatRed Hat build of OptaPlanner 8-cpe:/a:redhat:optaplanner:::el6
Red HatRed Hat build of Quarkus 2.13.8.SP2 2.13.8.Final-redhat-00005 ~ * cpe:/a:redhat:quarkus:2.13
Red HatRed Hat build of Quarkus 2.13.8.SP2 2.13.8.Final-redhat-00005 ~ * cpe:/a:redhat:quarkus:2.13
Red HatRed Hat build of Quarkus 2.13.8.SP2 2.13.8.Final-redhat-00005 ~ * cpe:/a:redhat:quarkus:2.13
Red HatRed Hat Camel Extensions for Quarkus 2.13.3-1-cpe:/a:redhat:camel_quarkus:2.13
Red HatRed Hat OpenShift Serverless 1.30 1.9.2-3 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.1-1 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.1-1 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.9.2-3 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.1-1 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.1-1 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.1-1 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.0-5 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.0-6 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRed Hat OpenShift Serverless 1.30 1.30.0-6 ~ * cpe:/a:redhat:openshift_serverless:1.30::el8
Red HatRHEL-8 based Middleware Containers 7.13.4-3 ~ * cpe:/a:redhat:rhosemc:1.0::el8
Red HatRHEL-8 based Middleware Containers 7.13.4-2 ~ * cpe:/a:redhat:rhosemc:1.0::el8
Red HatRHEL-8 based Middleware Containers 7.13.4-2 ~ * cpe:/a:redhat:rhosemc:1.0::el8
Red HatRHEL-8 based Middleware Containers 7.13.4-3 ~ * cpe:/a:redhat:rhosemc:1.0::el8
Red HatRHEL-8 based Middleware Containers 7.13.4-3 ~ * cpe:/a:redhat:rhosemc:1.0::el8
Red HatRHINT Camel-K-1.10.2-cpe:/a:redhat:camel_k:1
Red HatRHINT Service Registry 2.5.4 GA-cpe:/a:redhat:service_registry:2.5
Red HatRHPAM 7.13.4 async-cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13
Red HatRed Hat Process Automation 7-cpe:/a:redhat:jboss_enterprise_bpms_platform:7

II. Public POCs for CVE-2023-4853

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-4853

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2023-09-20 · 4 CVEs total

CVE-2022-35967.5 HIGHInstack-undercloud: rsync leaks information to undercloud
CVE-2022-39166.8 MEDIUMKeycloak: session takeover with oidc offline refreshtokens
CVE-2022-14386.4 MEDIUMKeycloak: xss on impersonation under specific circumstances

IV. Related Vulnerabilities

V. Comments for CVE-2023-4853

No comments yet


Leave a comment