CVE-2023-5720

A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build system within the application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*
cpe:2.3:a:quarkus:quarkus:3.0.0:candidate_release1:*:*:*:*:*:*
cpe:2.3:a:quarkus:quarkus:3.0.0:candidate_release2:*:*:*:*:*:*

History

21 Nov 2024, 08:42

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2023-5720 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-5720 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2245700 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2245700 - Issue Tracking, Vendor Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 7.7

22 Nov 2023, 22:39

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-15 14:15

Updated : 2024-11-21 08:42


NVD link : CVE-2023-5720

Mitre link : CVE-2023-5720

CVE.ORG link : CVE-2023-5720


JSON object : View

Products Affected

quarkus

  • quarkus
CWE
CWE-526

Exposure of Sensitive Information Through Environmental Variables

NVD-CWE-noinfo