Description
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:7612
https://access.redhat.com/errata/RHSA-2023:7700
https://access.redhat.com/security/cve/CVE-2023-6394
https://bugzilla.redhat.com/show_bug.cgi?id=2252197
Related Vulnerabilities
CVE-2020-14326 Vulnerability in maven package org.jboss.resteasy:resteasy-core
CVE-2022-29265 Vulnerability in maven package org.apache.nifi:nifi
CVE-2022-43431 Vulnerability in maven package com.compuware.jenkins:compuware-strobe-measurement
CVE-2019-10406 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-4116 Vulnerability in maven package io.quarkus:quarkus-vertx-http-deployment