Bug 2238034 (CVE-2023-4853) - CVE-2023-4853 quarkus: HTTP security policy bypass
Summary: CVE-2023-4853 quarkus: HTTP security policy bypass
Keywords:
Status: NEW
Alias: CVE-2023-4853
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2237893
TreeView+ depends on / blocked
 
Reported: 2023-09-08 16:29 UTC by Chess Hazlett
Modified: 2025-05-06 08:28 UTC (History)
54 users (show)

Fixed In Version: quarkus 2.16.11.Final, quarkus 3.2.6.Final, quarkus 3.3.3
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2023:5568 0 None None None 2023-10-10 09:59:12 UTC
Red Hat Product Errata RHBA-2023:5572 0 None None None 2023-10-10 10:02:09 UTC
Red Hat Product Errata RHSA-2023:5170 0 None None None 2023-09-14 14:33:04 UTC
Red Hat Product Errata RHSA-2023:5310 0 None None None 2023-09-20 07:40:56 UTC
Red Hat Product Errata RHSA-2023:5337 0 None None None 2023-09-21 19:07:25 UTC
Red Hat Product Errata RHSA-2023:5446 0 None None None 2023-10-04 16:04:05 UTC
Red Hat Product Errata RHSA-2023:5479 0 None None None 2023-10-05 14:36:47 UTC
Red Hat Product Errata RHSA-2023:5480 0 None None None 2023-10-05 15:25:38 UTC
Red Hat Product Errata RHSA-2023:6107 0 None None None 2023-10-25 12:35:24 UTC
Red Hat Product Errata RHSA-2023:6112 0 None None None 2023-10-25 13:03:44 UTC
Red Hat Product Errata RHSA-2023:7653 0 None None None 2023-12-05 14:36:40 UTC

Description Chess Hazlett 2023-09-08 16:29:40 UTC
Quarkus using HTTP security policies was found to not sanitize certain character permutations correctly when accepting requests, resulting in problematic request resolution. An attacker could use this flaw to bypass the security policy altogether, resulting in unauthorized information or function access, and possibly even denial of service.

Comment 8 errata-xmlrpc 2023-09-14 14:33:00 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus

Via RHSA-2023:5170 https://access.redhat.com/errata/RHSA-2023:5170

Comment 13 errata-xmlrpc 2023-09-20 07:40:53 UTC
This issue has been addressed in the following products:

  Red Hat Camel Extensions for Quarkus 2.13.3-1

Via RHSA-2023:5310 https://access.redhat.com/errata/RHSA-2023:5310

Comment 15 errata-xmlrpc 2023-09-21 19:07:21 UTC
This issue has been addressed in the following products:

  RHINT Camel-K-1.10.2

Via RHSA-2023:5337 https://access.redhat.com/errata/RHSA-2023:5337

Comment 17 errata-xmlrpc 2023-10-04 16:04:03 UTC
This issue has been addressed in the following products:

  Red Hat build of OptaPlanner Text-Only advisories

Via RHSA-2023:5446 https://access.redhat.com/errata/RHSA-2023:5446

Comment 18 errata-xmlrpc 2023-10-05 14:36:44 UTC
This issue has been addressed in the following products:

  Openshift Serverless 1 on RHEL 8

Via RHSA-2023:5479 https://access.redhat.com/errata/RHSA-2023:5479

Comment 19 errata-xmlrpc 2023-10-05 15:25:34 UTC
This issue has been addressed in the following products:

  RHOSS-1.30-RHEL-8

Via RHSA-2023:5480 https://access.redhat.com/errata/RHSA-2023:5480

Comment 21 errata-xmlrpc 2023-10-25 12:35:21 UTC
This issue has been addressed in the following products:

  RHEL-8 based Middleware Containers

Via RHSA-2023:6107 https://access.redhat.com/errata/RHSA-2023:6107

Comment 22 errata-xmlrpc 2023-10-25 13:03:41 UTC
This issue has been addressed in the following products:

  RHPAM 7.13.4 async

Via RHSA-2023:6112 https://access.redhat.com/errata/RHSA-2023:6112

Comment 24 errata-xmlrpc 2023-12-05 14:36:38 UTC
This issue has been addressed in the following products:

  RHINT Service Registry 2.5.4 GA

Via RHSA-2023:7653 https://access.redhat.com/errata/RHSA-2023:7653


Note You need to log in before you can comment on or make changes to this bug.