Description
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:5170
https://access.redhat.com/errata/RHSA-2023:5310
https://access.redhat.com/errata/RHSA-2023:5337
https://access.redhat.com/errata/RHSA-2023:5446
https://access.redhat.com/errata/RHSA-2023:5479
https://access.redhat.com/errata/RHSA-2023:5480
https://access.redhat.com/errata/RHSA-2023:6107
https://access.redhat.com/errata/RHSA-2023:6112
https://access.redhat.com/errata/RHSA-2023:7653
https://access.redhat.com/security/cve/CVE-2023-4853
https://access.redhat.com/security/vulnerabilities/RHSB-2023-002
https://bugzilla.redhat.com/show_bug.cgi?id=2238034
Related Vulnerabilities
CVE-2017-2582 Vulnerability in maven package org.keycloak:keycloak-saml-core
CVE-2022-45384 Vulnerability in maven package org.jenkins-ci.plugins:reverse-proxy-auth-plugin
CVE-2023-24831 Vulnerability in maven package org.apache.iotdb:iotdb-grafana-connector
CVE-2014-2065 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-34198 Vulnerability in maven package org.jenkins-ci.plugins:stashbranchparameter