Lucene search

K
cveRedhatCVE-2023-1584
HistoryOct 04, 2023 - 11:15 a.m.

CVE-2023-1584

2023-10-0411:15:09
CWE-200
redhat
web.nvd.nist.gov
103
quarkus
oidc
vulnerability
security
nvd
cve-2023-1584

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

35.2%

A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the access token to access user data from OIDC provider services. Please note that passwords are not stored in access tokens.

Affected configurations

Nvd
Node
quarkusquarkusRange<2.13.8
VendorProductVersionCPE
quarkusquarkus*cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "versions": [
      {
        "status": "unaffected",
        "version": "3.1.0.CR1"
      }
    ],
    "packageName": "quarkus-oidc",
    "collectionURL": "https://mvnrepository.com/artifact/io.quarkus"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat build of Quarkus 2.13.8.Final",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "io.quarkus/quarkus-oidc",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "2.13.8.Final-redhat-00004",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:quarkus:2.13"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "RHINT Service Registry 2.5.4 GA",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "unaffected",
    "packageName": "quarkus-oidc",
    "cpes": [
      "cpe:/a:redhat:service_registry:2.5"
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

35.2%