CVE-2023-4853

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
redhatCNA
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
VendorProductVersion
quarkusquarkus
𝑥
< 2.16.11
quarkusquarkus
3.2.0 ≤
𝑥
< 3.2.6
quarkusquarkus
3.3.0 ≤
𝑥
< 3.3.3
redhatbuild_of_optaplanner
8.0
redhatbuild_of_quarkus
2.13.0 ≤
𝑥
< 2.13.8
redhatdecision_manager
7.0
redhatintegration_camel_k
𝑥
< 1.10.2
redhatintegration_camel_quarkus
-
redhatintegration_service_registry
-
redhatjboss_middleware_text-only_advisories
1.0
redhatopenshift_serverless
-
redhatopenshift_serverless
1.0
redhatprocess_automation_manager
7.0
redhatopenshift_container_platform
4.10
redhatopenshift_container_platform
4.11
redhatopenshift_container_platform
4.12
𝑥
= Vulnerable software versions