Known Vulnerabilities for Red Hat #1
Our ongoing commitment to cybersecurity brings you this critical update on a vulnerability within the Quarkus endpoints, particularly ones utilizing the HTTP Security Policy.
Snapshot of the Issue (CVE-2023-4853):
Understanding the Vulnerability: Quarkus, known for its varied security methods, is currently grappling with a flaw in its HTTP security policy. The root of the problem is the policy's inability to handle request paths with multiple adjacent forward-slash characters. This results in a potential breach of security policy.
Example: Policies named ‘role-admin’ and ‘authenticated’ that secure paths like /service/* and /internal/* are being bypassed when accessed via paths such as https://<url>///service/ and https://<url>///internal/.
The implications of this flaw are substantial, from information leaks and unauthorized access to potential denial of service.
领英推荐
Recommendations & Mitigations:
Note: Adopting these solutions will necessitate rebuilding and redeploying the affected applications, unless specifically mentioned.
Affected Products: Quarkus 2.13, and various Red Hat products including Red Hat Decision Manager, OpenShift Serverless, and more are susceptible. Red Hat is urging all users to implement the provided updates promptly and adopt appropriate mitigations.
Upcoming Updates: Certain Red Hat products, such as Red Hat Integration Camel Quarkus and others, will have advisory and update links incorporated once they are available.
Diagnosis: Check your security configurations and environment files to spot possible uses of path-based authentication. If discovered, it's crucial to swiftly employ one of the suggested mitigation strategies.