First published: Tue Jun 27 2023(Updated: )
A flaw was found in Infinispan's REST. Bulk read endpoints do not properly evaluate user permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.infinispan:infinispan-server-rest | <14.0.18.Final | 14.0.18.Final |
maven/org.infinispan:infinispan-server-rest | >=15.0.0.Dev01<15.0.0.Dev04 | 15.0.0.Dev04 |
Red Hat JBoss Data Grid | ||
JBoss Enterprise Application Platform | =6 | |
Red Hat Data Grid | <8.4.4 | |
Infinispan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3628 has been classified as a moderate severity vulnerability due to potential unauthorized information access.
To remediate CVE-2023-3628, update Infinispan to version 14.0.18.Final or 15.0.0.Dev04 or later.
CVE-2023-3628 affects several versions of Infinispan, Red Hat JBoss Data Grid, and Red Hat JBoss Enterprise Application Platform.
CVE-2023-3628 is not typically remotely exploitable, as it requires authenticated access to the REST bulk read endpoints.
CVE-2023-3628 is an authorization flaw that allows authenticated users to access data beyond their permitted scope.