Description
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:7612
https://access.redhat.com/errata/RHSA-2023:7700
https://access.redhat.com/security/cve/CVE-2023-6394
https://bugzilla.redhat.com/show_bug.cgi?id=2252197
Related Vulnerabilities
CVE-2022-47937 Vulnerability in maven package org.apache.sling:org.apache.sling.commons.json
CVE-2017-1000084 Vulnerability in maven package org.jenkins-ci.plugins:parameterized-trigger
CVE-2018-17193 Vulnerability in maven package org.apache.nifi:nifi-web-utils
CVE-2023-25158 Vulnerability in maven package org.geotools.jdbc:gt-jdbc-mysql
CVE-2018-1317 Vulnerability in maven package org.apache.zeppelin:zeppelin