Description
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:7612
https://access.redhat.com/errata/RHSA-2023:7700
https://access.redhat.com/security/cve/CVE-2023-6394
https://bugzilla.redhat.com/show_bug.cgi?id=2252197
Related Vulnerabilities
CVE-2019-3773 Vulnerability in maven package org.springframework.ws:spring-ws-core
CVE-2020-27223 Vulnerability in maven package org.eclipse.jetty:jetty-server
CVE-2022-34209 Vulnerability in maven package org.jenkins-ci.plugins:threadfix
CVE-2021-36372 Vulnerability in maven package org.apache.ozone:ozone-common
CVE-2016-6652 Vulnerability in maven package org.springframework.data:spring-data-jpa