cve-2023-4853
Vulnerability from cvelistv5
Published
2023-09-20 09:47
Modified
2024-11-23 01:02
Summary
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:5170Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:5310Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:5337Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:5446Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:5479Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:5480Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6107Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6112Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7653Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2023-4853Mitigation, Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-002Exploit, Mitigation, Technical Description, Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2238034Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:5170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:5310Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:5337Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:5446Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:5479Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:5480Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6107Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6112Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7653Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-4853Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/vulnerabilities/RHSB-2023-002Exploit, Mitigation, Technical Description, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2238034Issue Tracking, Vendor Advisory
Impacted products
Vendor Product Version
Red Hat Openshift Serverless 1 on RHEL 8 Unaffected: 0:1.9.2-3.el8   < *
    cpe:/a:redhat:serverless:1.0::el8
Create a notification for this product.
   Red Hat Red Hat build of OptaPlanner 8     cpe:/a:redhat:optaplanner:::el6
Create a notification for this product.
   Red Hat Red Hat build of Quarkus 2.13.8.SP2 Unaffected: 2.13.8.Final-redhat-00005   < *
    cpe:/a:redhat:quarkus:2.13
Create a notification for this product.
   Red Hat Red Hat build of Quarkus 2.13.8.SP2 Unaffected: 2.13.8.Final-redhat-00005   < *
    cpe:/a:redhat:quarkus:2.13
Create a notification for this product.
   Red Hat Red Hat build of Quarkus 2.13.8.SP2 Unaffected: 2.13.8.Final-redhat-00005   < *
    cpe:/a:redhat:quarkus:2.13
Create a notification for this product.
   Red Hat Red Hat Camel Extensions for Quarkus 2.13.3-1     cpe:/a:redhat:camel_quarkus:2.13
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.9.2-3   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.1-1   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.1-1   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.9.2-3   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.1-1   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.1-1   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.1-1   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.0-5   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.0-6   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat Red Hat OpenShift Serverless 1.30 Unaffected: 1.30.0-6   < *
    cpe:/a:redhat:openshift_serverless:1.30::el8
Create a notification for this product.
   Red Hat RHEL-8 based Middleware Containers Unaffected: 7.13.4-3   < *
    cpe:/a:redhat:rhosemc:1.0::el8
Create a notification for this product.
   Red Hat RHEL-8 based Middleware Containers Unaffected: 7.13.4-2   < *
    cpe:/a:redhat:rhosemc:1.0::el8
Create a notification for this product.
   Red Hat RHEL-8 based Middleware Containers Unaffected: 7.13.4-2   < *
    cpe:/a:redhat:rhosemc:1.0::el8
Create a notification for this product.
   Red Hat RHEL-8 based Middleware Containers Unaffected: 7.13.4-3   < *
    cpe:/a:redhat:rhosemc:1.0::el8
Create a notification for this product.
   Red Hat RHEL-8 based Middleware Containers Unaffected: 7.13.4-3   < *
    cpe:/a:redhat:rhosemc:1.0::el8
Create a notification for this product.
   Red Hat RHINT Camel-K-1.10.2     cpe:/a:redhat:camel_k:1
Create a notification for this product.
   Red Hat RHINT Service Registry 2.5.4 GA     cpe:/a:redhat:service_registry:2.5
Create a notification for this product.
   Red Hat RHPAM 7.13.4 async     cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13
Create a notification for this product.
   Red Hat Red Hat Process Automation 7     cpe:/a:redhat:jboss_enterprise_bpms_platform:7
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:38:00.803Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2023:5170",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:5170",
               },
               {
                  name: "RHSA-2023:5310",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:5310",
               },
               {
                  name: "RHSA-2023:5337",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:5337",
               },
               {
                  name: "RHSA-2023:5446",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:5446",
               },
               {
                  name: "RHSA-2023:5479",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:5479",
               },
               {
                  name: "RHSA-2023:5480",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:5480",
               },
               {
                  name: "RHSA-2023:6107",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:6107",
               },
               {
                  name: "RHSA-2023:6112",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:6112",
               },
               {
                  name: "RHSA-2023:7653",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2023:7653",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-4853",
               },
               {
                  name: "RHSB-2023-002",
                  tags: [
                     "technical-description",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-002",
               },
               {
                  name: "RHBZ#2238034",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2238034",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:serverless:1.0::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-clients",
               product: "Openshift Serverless 1 on RHEL 8",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "0:1.9.2-3.el8",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:optaplanner:::el6",
               ],
               defaultStatus: "unaffected",
               packageName: "quarkus-vertx-http",
               product: "Red Hat build of OptaPlanner 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:quarkus:2.13",
               ],
               defaultStatus: "affected",
               packageName: "io.quarkus/quarkus-keycloak-authorization",
               product: "Red Hat build of Quarkus 2.13.8.SP2",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "2.13.8.Final-redhat-00005",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:quarkus:2.13",
               ],
               defaultStatus: "affected",
               packageName: "io.quarkus/quarkus-undertow",
               product: "Red Hat build of Quarkus 2.13.8.SP2",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "2.13.8.Final-redhat-00005",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:quarkus:2.13",
               ],
               defaultStatus: "affected",
               packageName: "io.quarkus/quarkus-vertx-http",
               product: "Red Hat build of Quarkus 2.13.8.SP2",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "2.13.8.Final-redhat-00005",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
               cpes: [
                  "cpe:/a:redhat:camel_quarkus:2.13",
               ],
               defaultStatus: "unaffected",
               packageName: "quarkus-vertx-http",
               product: "Red Hat Camel Extensions for Quarkus 2.13.3-1",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1/client-kn-rhel8",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.9.2-3",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1/ingress-rhel8-operator",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.1-1",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1/knative-rhel8-operator",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.1-1",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1/kn-cli-artifacts-rhel8",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.9.2-3",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1/serverless-operator-bundle",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.1-1",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1/serverless-rhel8-operator",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.1-1",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1/svls-must-gather-rhel8",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.1-1",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1-tech-preview/logic-data-index-ephemeral-rhel8",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.0-5",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1-tech-preview/logic-swf-builder-rhel8",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.0-6",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:openshift_serverless:1.30::el8",
               ],
               defaultStatus: "affected",
               packageName: "openshift-serverless-1-tech-preview/logic-swf-devmode-rhel8",
               product: "Red Hat OpenShift Serverless 1.30",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "1.30.0-6",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:rhosemc:1.0::el8",
               ],
               defaultStatus: "affected",
               packageName: "rhpam-7/rhpam-kogito-builder-rhel8",
               product: "RHEL-8 based Middleware Containers",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "7.13.4-3",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:rhosemc:1.0::el8",
               ],
               defaultStatus: "affected",
               packageName: "rhpam-7/rhpam-kogito-rhel8-operator",
               product: "RHEL-8 based Middleware Containers",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "7.13.4-2",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:rhosemc:1.0::el8",
               ],
               defaultStatus: "affected",
               packageName: "rhpam-7/rhpam-kogito-rhel8-operator-bundle",
               product: "RHEL-8 based Middleware Containers",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "7.13.4-2",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:rhosemc:1.0::el8",
               ],
               defaultStatus: "affected",
               packageName: "rhpam-7/rhpam-kogito-runtime-jvm-rhel8",
               product: "RHEL-8 based Middleware Containers",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "7.13.4-3",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:rhosemc:1.0::el8",
               ],
               defaultStatus: "affected",
               packageName: "rhpam-7-tech-preview/rhpam-kogito-runtime-native-rhel8",
               product: "RHEL-8 based Middleware Containers",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "7.13.4-3",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
               cpes: [
                  "cpe:/a:redhat:camel_k:1",
               ],
               defaultStatus: "unaffected",
               packageName: "quarkus-vertx-http",
               product: "RHINT Camel-K-1.10.2",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:service_registry:2.5",
               ],
               defaultStatus: "unaffected",
               packageName: "quarkus-vertx-http",
               product: "RHINT Service Registry 2.5.4 GA",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13",
               ],
               defaultStatus: "unaffected",
               product: "RHPAM 7.13.4 async",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:jboss_enterprise_bpms_platform:7",
               ],
               defaultStatus: "affected",
               packageName: "quarkus-vertx-http",
               product: "Red Hat Process Automation 7",
               vendor: "Red Hat",
            },
         ],
         datePublic: "2023-09-08T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Important",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-148",
                     description: "Improper Neutralization of Input Leaders",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-11-23T01:02:43.871Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "RHSA-2023:5170",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:5170",
            },
            {
               name: "RHSA-2023:5310",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:5310",
            },
            {
               name: "RHSA-2023:5337",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:5337",
            },
            {
               name: "RHSA-2023:5446",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:5446",
            },
            {
               name: "RHSA-2023:5479",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:5479",
            },
            {
               name: "RHSA-2023:5480",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:5480",
            },
            {
               name: "RHSA-2023:6107",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:6107",
            },
            {
               name: "RHSA-2023:6112",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:6112",
            },
            {
               name: "RHSA-2023:7653",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2023:7653",
            },
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-4853",
            },
            {
               name: "RHSB-2023-002",
               tags: [
                  "technical-description",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-002",
            },
            {
               name: "RHBZ#2238034",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2238034",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-09-08T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-09-08T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Quarkus: http security policy bypass",
         workarounds: [
            {
               lang: "en",
               value: "Use a ‘deny’ wildcard for base paths, then authenticate specifics within that:\n\nExamples:\n```\ndeny: /*\nauthenticated: /services/*\n```\nor\n```\ndeny: /services/*\nroles-allowed: /services/rbac/*\n```\n\nNOTE: Products are only vulnerable if they use (or allow use of) path-based HTTP policy configuration. Products may also be affected–shipping the component in question–without being vulnerable (“affected at reduced impact”).\n\nSee https://access.redhat.com/security/vulnerabilities/RHSB-2023-002 for more detailed mitigations.",
            },
         ],
         x_redhatCweChain: "CWE-148: Improper Neutralization of Input Leaders",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-4853",
      datePublished: "2023-09-20T09:47:32.150Z",
      dateReserved: "2023-09-08T16:10:38.379Z",
      dateUpdated: "2024-11-23T01:02:43.871Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.16.11\", \"matchCriteriaId\": \"F1985AD9-735A-4BBB-8E7B-B3271DC601C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.2.0\", \"versionEndExcluding\": \"3.2.6\", \"matchCriteriaId\": \"B7A7D975-A081-4FA5-A97A-B430102325ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.3.0\", \"versionEndExcluding\": \"3.3.3\", \"matchCriteriaId\": \"F51936A7-39F2-42F4-87C5-D99445652F6B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D54F5AE-61EC-4434-9D5F-9394A3979894\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:build_of_quarkus:*:*:*:*:text-only:*:*:*\", \"versionStartIncluding\": \"2.13.0\", \"versionEndExcluding\": \"2.13.8\", \"matchCriteriaId\": \"ACCC2DC7-4127-4429-BC5B-C555458D790A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68146098-58F8-417E-B165-5182527117C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:integration_camel_k:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.10.2\", \"matchCriteriaId\": \"176A2C2D-9397-4238-B803-54F60ED795C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F039C746-2001-4EE5-835F-49607A94F12B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF03BDE8-602D-4DEE-BA5B-5B20FDF47741\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_middleware:1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F4A0F87-524E-4935-9B07-93793D8143FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:*\", \"matchCriteriaId\": \"A0FED4EE-0AE2-4BD8-8DAC-143382E4DB7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77675CB7-67D7-44E9-B7FF-D224B3341AA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_serverless:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C18B8793-52C2-46E2-8752-92552AD4A643\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:process_automation_manager:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4857DA21-9127-4F6A-9DA1-96678D9F9472\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0595C9F8-9C7A-4FC1-B7EE-52978A1B1E93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA983F8C-3A06-450A-AEFF-9429DE9A3454\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40449571-22F8-44FA-B57B-B43F71AB25E2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 una falla en Quarkus donde las pol\\u00edticas de seguridad HTTP no sanitiza correctamente ciertas permutaciones de caracteres al aceptar solicitudes, lo que resulta en una evaluaci\\u00f3n incorrecta de los permisos. Este problema podr\\u00eda permitir que un atacante eluda la pol\\u00edtica de seguridad por completo, lo que resultar\\u00eda en un acceso no autorizado al endpoint y posiblemente una Denegaci\\u00f3n de Servicio.\"}]",
         id: "CVE-2023-4853",
         lastModified: "2024-11-21T08:36:06.910",
         metrics: "{\"cvssMetricV31\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}]}",
         published: "2023-09-20T10:15:14.947",
         references: "[{\"url\": \"https://access.redhat.com/errata/RHSA-2023:5170\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5310\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5337\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5446\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5479\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5480\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:6107\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:6112\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:7653\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-4853\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/RHSB-2023-002\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Mitigation\", \"Technical Description\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2238034\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5170\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5310\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5337\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5446\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5479\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:5480\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:6107\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:6112\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:7653\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-4853\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/RHSB-2023-002\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mitigation\", \"Technical Description\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2238034\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}]",
         sourceIdentifier: "secalert@redhat.com",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-148\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2023-4853\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-09-20T10:15:14.947\",\"lastModified\":\"2024-11-21T08:36:06.910\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se encontró una falla en Quarkus donde las políticas de seguridad HTTP no sanitiza correctamente ciertas permutaciones de caracteres al aceptar solicitudes, lo que resulta en una evaluación incorrecta de los permisos. Este problema podría permitir que un atacante eluda la política de seguridad por completo, lo que resultaría en un acceso no autorizado al endpoint y posiblemente una Denegación de Servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-148\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.16.11\",\"matchCriteriaId\":\"F1985AD9-735A-4BBB-8E7B-B3271DC601C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndExcluding\":\"3.2.6\",\"matchCriteriaId\":\"B7A7D975-A081-4FA5-A97A-B430102325ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3.0\",\"versionEndExcluding\":\"3.3.3\",\"matchCriteriaId\":\"F51936A7-39F2-42F4-87C5-D99445652F6B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D54F5AE-61EC-4434-9D5F-9394A3979894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:build_of_quarkus:*:*:*:*:text-only:*:*:*\",\"versionStartIncluding\":\"2.13.0\",\"versionEndExcluding\":\"2.13.8\",\"matchCriteriaId\":\"ACCC2DC7-4127-4429-BC5B-C555458D790A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68146098-58F8-417E-B165-5182527117C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:integration_camel_k:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.10.2\",\"matchCriteriaId\":\"176A2C2D-9397-4238-B803-54F60ED795C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F039C746-2001-4EE5-835F-49607A94F12B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF03BDE8-602D-4DEE-BA5B-5B20FDF47741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_middleware:1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4A0F87-524E-4935-9B07-93793D8143FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:*\",\"matchCriteriaId\":\"A0FED4EE-0AE2-4BD8-8DAC-143382E4DB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77675CB7-67D7-44E9-B7FF-D224B3341AA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_serverless:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18B8793-52C2-46E2-8752-92552AD4A643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:process_automation_manager:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4857DA21-9127-4F6A-9DA1-96678D9F9472\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0595C9F8-9C7A-4FC1-B7EE-52978A1B1E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA983F8C-3A06-450A-AEFF-9429DE9A3454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40449571-22F8-44FA-B57B-B43F71AB25E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5170\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5310\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5337\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5446\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5479\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5480\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:6107\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:6112\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:7653\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-4853\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/RHSB-2023-002\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2238034\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5170\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5310\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5337\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5446\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:5480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:6107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:6112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:7653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-4853\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/RHSB-2023-002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2238034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.