6.5
CVE-2023-5675
- EPSS 0.13%
- Veröffentlicht 25.04.2024 16:15:08
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Quarkus: authorization flaw in quarkus resteasy reactive and classic when "quarkus.security.jaxrs.deny-unannotated-endpoints" or "quarkus.security.jaxrs.default-roles-allowed" properties are used.
A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://mvnrepository.com/artifact/io.quarkus
≫
Paket
quarkus-resteasy-reactive
Default Statusunaffected
Version
3.2.0
Version <
3.2.10.Final
Status
affected
Version
3.6.0
Version <
3.6.9
Status
affected
Version
3.7.0
Version <
3.7.1
Status
affected
Version
3.8.0
Version <
3.8.*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Quarkus 2.13.9.Final
Default Statusaffected
Version
2.13.9.Final-redhat-00003
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Quarkus 2.13.9.Final
Default Statusaffected
Version
2.13.9.Final-redhat-00003
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Quarkus 3.2.9.Final
Default Statusaffected
Version
3.2.9.Final-redhat-00003
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Quarkus 3.2.9.Final
Default Statusaffected
Version
3.2.9.Final-redhat-00003
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
A-MQ Clients 2
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Cryostat 2
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Serverless
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Apicurio Registry 2
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of OptaPlanner 8
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Fuse 7
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Integration Camel K 1
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Integration Camel Quarkus 2
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Enterprise Application Platform 8
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Process Automation 7
Default Statusaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.319 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
CWE-285 Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.