Quarkus HTTP Security Policy Bypass via Unsanitized Character Permutations
CVE-2023-4853 Published on September 20, 2023

Quarkus: http security policy bypass
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2023-4853 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Timeline

Reported to Red Hat.

Made public.

Weakness Type

Improper Neutralization of Input Leaders

The application does not properly handle when a leading character or sequence ("leader") is missing or malformed, or if multiple leaders are used when only one should be allowed.


Products Associated with CVE-2023-4853

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-4853 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Red Hat Openshift Serverless 1 on RHEL 8: Red Hat build of OptaPlanner 8: Red Hat build of Quarkus 2.13.8.SP2: Red Hat build of Quarkus 2.13.8.SP2: Red Hat build of Quarkus 2.13.8.SP2: Red Hat Camel Extensions for Quarkus 2.13.3-1: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat OpenShift Serverless 1.30: Red Hat RHEL-8 based Middleware Containers: Red Hat RHEL-8 based Middleware Containers: Red Hat RHEL-8 based Middleware Containers: Red Hat RHEL-8 based Middleware Containers: Red Hat RHEL-8 based Middleware Containers: Red Hat RHINT Camel-K-1.10.2: Red Hat RHINT Service Registry 2.5.4 GA: Red Hat RHPAM 7.13.4 async: Red Hat Process Automation 7:

Exploit Probability

EPSS
0.35%
Percentile
56.90%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.