First published: Fri Oct 20 2023(Updated: )
When a RestEasy Reactive JAX-RS endpoint has its methods with HTTP method annotations declared in the abstract Java class or when its methods without HTTP method annotations are customised by Quarkus extensions to handle JAX-RS GET requests using the annotation processor, then the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties So a combination of 2 factors triggers it: * Users enable the security authorization of JAX-RS endpoints with either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or `quarkus.security.jaxrs.default-roles-allowed` properties * Users declare JAX-RS methods which must be secured with these properties in the Java abstract class which the JAX-RS endpoint class will extend
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Quarkus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2245197 is critical as it affects endpoint authorization in Red Hat Quarkus.
To fix REDHAT-BUG-2245197, update to the latest version of Red Hat Quarkus that contains the security patches addressing this vulnerability.
REDHAT-BUG-2245197 affects the Red Hat Build of Quarkus.
The potential impacts of REDHAT-BUG-2245197 include unauthorized access to protected resources due to improper authorization checks.
REDHAT-BUG-2245197 was reported recently, highlighting an urgent need for remediation in application security.