Description
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:7612
https://access.redhat.com/errata/RHSA-2023:7700
https://access.redhat.com/security/cve/CVE-2023-6394
https://bugzilla.redhat.com/show_bug.cgi?id=2252197
Related Vulnerabilities
CVE-2020-1695 Vulnerability in maven package org.jboss.resteasy:resteasy-jaxrs
CVE-2023-26136 Vulnerability in maven package org.webjars.npm:tough-cookie
CVE-2021-21616 Vulnerability in maven package org.biouno:uno-choice
CVE-2018-1000014 Vulnerability in maven package org.jenkins-ci.plugins:translation
CVE-2023-50774 Vulnerability in maven package org.jenkins-ci.plugins:htmlresource