First published: Tue Jun 27 2023(Updated: )
A flaw was found in Infinispan's REST, Cache retrieval endpoints do not properly evaluate the necessary admin permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.infinispan:infinispan-server-rest | <14.0.18.Final | 14.0.18.Final |
maven/org.infinispan:infinispan-server-rest | >=15.0.0.Dev01<15.0.0.Dev04 | 15.0.0.Dev04 |
Red Hat Data Grid | <8.4.4 | |
Red Hat JBoss Data Grid | ||
JBoss Enterprise Application Platform | =6 | |
Infinispan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3629 is considered a moderate severity vulnerability due to improper permission checks in Infinispan's REST endpoints.
To remediate CVE-2023-3629, upgrade to Infinispan version 14.0.18.Final or 15.0.0.Dev04 or apply necessary patches as indicated by vendor advisories.
CVE-2023-3629 could allow authenticated users to access sensitive cache information that they should not have permission to view.
CVE-2023-3629 affects Infinispan versions prior to 14.0.18.Final and those between 15.0.0.Dev01 and 15.0.0.Dev04.
No, user authentication alone is inadequate because the flaw allows authenticated users to bypass intended access controls.