Quarkus

Quarkus

47 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 06.05.2025 19:49:16
  • Zuletzt bearbeitet 31.07.2025 18:10:06

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developer...

  • EPSS 0.07%
  • Veröffentlicht 13.03.2024 10:15:08
  • Zuletzt bearbeitet 21.11.2024 08:51:43

A vulnerability was found in Quarkus. In certain conditions related to the CI process, git credentials could be inadvertently published, which could put the git repository at risk.

  • EPSS 0.67%
  • Veröffentlicht 25.01.2024 19:15:08
  • Zuletzt bearbeitet 04.12.2024 08:15:05

A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This do...

  • EPSS 0.29%
  • Veröffentlicht 09.12.2023 02:15:06
  • Zuletzt bearbeitet 21.11.2024 08:43:46

A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can...

  • EPSS 1.86%
  • Veröffentlicht 15.11.2023 14:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:21

A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build s...

  • EPSS 0.29%
  • Veröffentlicht 04.10.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:39:29

A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the acc...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 20.09.2023 10:15:14
  • Zuletzt bearbeitet 21.11.2024 08:36:06

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security ...

  • EPSS 0.03%
  • Veröffentlicht 24.02.2023 18:15:14
  • Zuletzt bearbeitet 12.03.2025 16:15:18

In RestEasy Reactive implementation of Quarkus the insecure File.createTempFile() is used in the FileBodyHandler class which creates temp files with insecure permissions that could be read by a local user.

  • EPSS 0.11%
  • Veröffentlicht 23.02.2023 20:15:12
  • Zuletzt bearbeitet 21.11.2024 07:36:27

If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.

  • EPSS 0.26%
  • Veröffentlicht 06.12.2022 19:15:10
  • Zuletzt bearbeitet 14.04.2025 18:15:25

Quarkus CORS filter allows simple GET and POST requests with invalid Origin to proceed. Simple GET or POST requests made with XMLHttpRequest are the ones which have no event listeners registered on the object returned by the XMLHttpRequest upload pro...