Quarkus HTTP Security Policy Bypass via Unsanitized Character Permutations
CVE-2023-4853 Published on September 20, 2023
Quarkus: http security policy bypass
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
Vulnerability Analysis
CVE-2023-4853 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Timeline
Reported to Red Hat.
Made public.
Weakness Type
Improper Neutralization of Input Leaders
The application does not properly handle when a leading character or sequence ("leader") is missing or malformed, or if multiple leaders are used when only one should be allowed.
Products Associated with CVE-2023-4853
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-4853 are published in these products:
Affected Versions
Red Hat Openshift Serverless 1 on RHEL 8:- Version 0:1.9.2-3.el8 and below * is unaffected.
- Version 2.13.8.Final-redhat-00005 and below * is unaffected.
- Version 2.13.8.Final-redhat-00005 and below * is unaffected.
- Version 2.13.8.Final-redhat-00005 and below * is unaffected.
- Version 1.9.2-3 and below * is unaffected.
- Version 1.30.1-1 and below * is unaffected.
- Version 1.30.1-1 and below * is unaffected.
- Version 1.9.2-3 and below * is unaffected.
- Version 1.30.1-1 and below * is unaffected.
- Version 1.30.1-1 and below * is unaffected.
- Version 1.30.1-1 and below * is unaffected.
- Version 1.30.0-5 and below * is unaffected.
- Version 1.30.0-6 and below * is unaffected.
- Version 1.30.0-6 and below * is unaffected.
- Version 7.13.4-3 and below * is unaffected.
- Version 7.13.4-2 and below * is unaffected.
- Version 7.13.4-2 and below * is unaffected.
- Version 7.13.4-3 and below * is unaffected.
- Version 7.13.4-3 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.