A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
Workaround:
The product does not properly handle when a leading character or sequence ("leader") is missing or malformed, or if multiple leaders are used when only one should be allowed.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:5170 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:5310 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:5337 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:5446 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:5479 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:5480 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:6107 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:6112 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7653 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-4853 | vendor advisory mitigation vdb entry |
https://access.redhat.com/security/vulnerabilities/RHSB-2023-002 | exploit vendor advisory mitigation technical description |
https://bugzilla.redhat.com/show_bug.cgi?id=2238034 | vendor advisory issue tracking |