Bug 2253113 (CVE-2023-6393)

Summary: CVE-2023-6393 quarkus: Potential invalid reuse of context when @CacheResult on a Uni is used
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: anstephe, avibelli, bgeorges, chazlett, clement.escoffier, dandread, dkreling, gsmet, jmartisk, lthon, max.andersen, mosmerov, pgallagh, pjindal, probinso, rruss, rsvoboda, sbiarozk, tqvarnst
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: quarkus 3.2.9.GA, quarkus 2.13.9.CR2 Doc Type: ---
Doc Text:
A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2250887    

Description Patrick Del Bello 2023-12-06 05:20:15 UTC
A flaw was found under Quarkus Cache Runtime. When a request processing utilizes a Uni cached using @CacheResult, and if the cached Uni reuses the initial "completion" context, the processing switches to the context of the cached Uni instead of the request context. It can be a problem if the cached Uni context contains sensitive information. A malicious user could benefit from this as a POST request could possibly return the response that is meant for another user, having access to sensitive data.

https://github.com/quarkusio/quarkus/issues/37078

Comment 2 errata-xmlrpc 2023-12-07 14:26:54 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 2.13.9

Via RHSA-2023:7700 https://access.redhat.com/errata/RHSA-2023:7700