First published: Thu Nov 23 2023(Updated: )
A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based security.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.quarkus.resteasy.reactive:resteasy-reactive | >=3.0.0.Final<3.2.9.Final | 3.2.9.Final |
maven/io.quarkus.resteasy.reactive:resteasy-reactive | <2.13.9.Final | 2.13.9.Final |
Red Hat Quarkus | <2.13.9 | |
Red Hat Quarkus | >=3.0.0<3.2.9 | |
Red Hat Quarkus | =2.13.9 | |
Red Hat Quarkus | =3.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6267 has been classified with a medium severity level due to the potential for security bypass in REST resources.
To fix CVE-2023-6267, upgrade to io.quarkus.resteasy.reactive version 3.2.9.Final or 2.13.9.Final or later.
CVE-2023-6267 is a deserialization vulnerability affecting the JSON payload processing in annotation based security.
CVE-2023-6267 affects all versions of Red Hat Quarkus from 2.0.0 to 3.2.8 and includes specific versions like 2.13.9 and 3.2.9.
The impact of CVE-2023-6267 includes potential unauthorized data access due to security constraints being evaluated after JSON deserialization.