A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based security.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:0494 | |
https://access.redhat.com/errata/RHSA-2024:0495 | |
https://access.redhat.com/security/cve/CVE-2023-6267 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2251155 | Issue Tracking Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:0494 | |
https://access.redhat.com/errata/RHSA-2024:0495 | |
https://access.redhat.com/security/cve/CVE-2023-6267 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2251155 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Dec 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
24 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-502 |
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
References | () https://access.redhat.com/errata/RHSA-2024:0494 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0495 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-6267 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2251155 - Issue Tracking, Vendor Advisory |
17 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jan 2024, 17:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:quarkus:quarkus:3.2.9:-:*:*:*:*:*:* cpe:2.3:a:quarkus:quarkus:2.13.9:-:*:*:*:*:*:* cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:* |
|
References | () https://access.redhat.com/security/cve/CVE-2023-6267 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2251155 - Issue Tracking, Vendor Advisory | |
CWE | CWE-755 |
25 Jan 2024, 19:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-25 19:15
Updated : 2024-12-04 08:15
NVD link : CVE-2023-6267
Mitre link : CVE-2023-6267
CVE.ORG link : CVE-2023-6267
JSON object : View
Products Affected
quarkus
- quarkus
CWE
CWE-755
Improper Handling of Exceptional Conditions