First published: Fri Oct 20 2023(Updated: )
A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.quarkus:quarkus-resteasy-reactive-common | >=3.7.0<3.7.1 | 3.7.1 |
maven/io.quarkus:quarkus-resteasy-reactive-common-deployment | >=3.7.0<3.7.1 | 3.7.1 |
maven/io.quarkus:quarkus-resteasy-reactive-common | >=3.3.0<3.6.9 | 3.6.9 |
maven/io.quarkus:quarkus-resteasy-reactive-common-deployment | >=3.3.0<3.6.9 | 3.6.9 |
maven/io.quarkus:quarkus-resteasy-reactive-common | <3.2.10.Final | 3.2.10.Final |
maven/io.quarkus:quarkus-resteasy-reactive-common-deployment | <3.2.10.Final | 3.2.10.Final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5675 is considered a critical security vulnerability in Quarkus.
To fix CVE-2023-5675, update Quarkus to version 3.7.1 for both quarkus-resteasy-reactive-common and quarkus-resteasy-reactive-common-deployment.
CVE-2023-5675 affects Quarkus versions 3.3.0 to 3.7.0 for the packages io.quarkus:quarkus-resteasy-reactive-common and io.quarkus:quarkus-resteasy-reactive-common-deployment.
The consequences of CVE-2023-5675 include the potential failure to enforce authorization on specified JAX-RS methods, which may lead to unauthorized access.
There are no known workarounds for CVE-2023-5675; updating to the latest version is recommended.