CVE-2023-6393

A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*

History

02 Aug 2024, 13:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2023:7700 -

12 Dec 2023, 16:26

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*
First Time Redhat
Redhat build Of Quarkus
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://bugzilla.redhat.com/show_bug.cgi?id=2253113 - () https://bugzilla.redhat.com/show_bug.cgi?id=2253113 - Issue Tracking, Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-6393 - () https://access.redhat.com/security/cve/CVE-2023-6393 - Vendor Advisory

06 Dec 2023, 18:49

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-06 17:15

Updated : 2024-08-02 13:15


NVD link : CVE-2023-6393

Mitre link : CVE-2023-6393

CVE.ORG link : CVE-2023-6393


JSON object : View

Products Affected

redhat

  • build_of_quarkus
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor