First published: Mon Nov 28 2022(Updated: )
A vulnerability was found in Quarkus. The Quarkus CORS filter allows simple GET and POST requests with an invalid Origin to proceed. Simple GET or POST requests made with XMLHttpRequest have no event listeners registered on the object returned by the XMLHttpRequest upload property, and have no ReadableStream object used in the request.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Quarkus Quarkus | >=2.0<2.13.5 | |
Quarkus Quarkus | >=2.14.0<2.14.2 | |
>=2.0<2.13.5 | ||
>=2.14.0<2.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Quarkus CORS filter vulnerability is CVE-2022-4147.
CVE-2022-4147 has a severity level of high.
The Quarkus CORS filter vulnerability allows simple GET and POST requests with an invalid Origin to proceed.
The Quarkus CORS filter vulnerability affects simple GET and POST requests made with XMLHttpRequest.
No, affected simple GET or POST requests made with XMLHttpRequest have no event listeners registered on the object returned by the XMLHttpRequest upload property.