Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-5675", "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "state": "PUBLISHED", "assignerShortName": "redhat", "dateReserved": "2023-10-20T04:42:22.947Z", "datePublished": "2024-04-25T15:44:55.582Z", "dateUpdated": "2025-03-03T16:28:38.788Z"}, "containers": {"cna": {"title": "Quarkus: authorization flaw in quarkus resteasy reactive and classic when \"quarkus.security.jaxrs.deny-unannotated-endpoints\" or \"quarkus.security.jaxrs.default-roles-allowed\" properties are used.", "metrics": [{"other": {"content": {"value": "Moderate", "namespace": "https://access.redhat.com/security/updates/classification/"}, "type": "Red Hat severity rating"}}, {"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1"}, "format": "CVSS"}], "descriptions": [{"lang": "en", "value": "A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties."}], "affected": [{"versions": [{"status": "affected", "version": "3.2.0", "lessThan": "3.2.10.Final", "versionType": "maven"}, {"status": "affected", "version": "3.6.0", "lessThan": "3.6.9", "versionType": "maven"}, {"status": "affected", "version": "3.7.0", "lessThan": "3.7.1", "versionType": "maven"}, {"status": "unaffected", "version": "3.8.0", "lessThan": "3.8.*", "versionType": "maven"}], "packageName": "quarkus-resteasy-reactive", "collectionURL": "https://mvnrepository.com/artifact/io.quarkus", "defaultStatus": "unaffected"}, {"vendor": "Red Hat", "product": "Red Hat build of Quarkus 2.13.9.Final", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "io.quarkus/quarkus-resteasy", "defaultStatus": "affected", "versions": [{"version": "2.13.9.Final-redhat-00003", "lessThan": "*", "versionType": "rpm", "status": "unaffected"}], "cpes": ["cpe:/a:redhat:quarkus:2.13"]}, {"vendor": "Red Hat", "product": "Red Hat build of Quarkus 2.13.9.Final", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "io.quarkus/quarkus-resteasy-reactive", "defaultStatus": "affected", "versions": [{"version": "2.13.9.Final-redhat-00003", "lessThan": "*", "versionType": "rpm", "status": "unaffected"}], "cpes": ["cpe:/a:redhat:quarkus:2.13"]}, {"vendor": "Red Hat", "product": "Red Hat build of Quarkus 3.2.9.Final", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "io.quarkus/quarkus-resteasy", "defaultStatus": "affected", "versions": [{"version": "3.2.9.Final-redhat-00003", "lessThan": "*", "versionType": "rpm", "status": "unaffected"}], "cpes": ["cpe:/a:redhat:quarkus:3.2"]}, {"vendor": "Red Hat", "product": "Red Hat build of Quarkus 3.2.9.Final", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "io.quarkus/quarkus-resteasy-reactive", "defaultStatus": "affected", "versions": [{"version": "3.2.9.Final-redhat-00003", "lessThan": "*", "versionType": "rpm", "status": "unaffected"}], "cpes": ["cpe:/a:redhat:quarkus:3.2"]}, {"vendor": "Red Hat", "product": "A-MQ Clients 2", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:a_mq_clients:2"]}, {"vendor": "Red Hat", "product": "Cryostat 2", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:cryostat:2"]}, {"vendor": "Red Hat", "product": "OpenShift Serverless", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:serverless:1"]}, {"vendor": "Red Hat", "product": "Red Hat build of Apicurio Registry 2", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:service_registry:2"]}, {"vendor": "Red Hat", "product": "Red Hat build of OptaPlanner 8", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:optaplanner:::el6"]}, {"vendor": "Red Hat", "product": "Red Hat Fuse 7", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:jboss_fuse:7"]}, {"vendor": "Red Hat", "product": "Red Hat Integration Camel K 1", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:integration:1"]}, {"vendor": "Red Hat", "product": "Red Hat Integration Camel Quarkus 2", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:camel_quarkus:2"]}, {"vendor": "Red Hat", "product": "Red Hat JBoss Enterprise Application Platform 8", "collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:jboss_enterprise_application_platform:8"]}, {"vendor": "Red Hat", "product": "Red Hat Process Automation 7", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "quarkus-resteasy-reactive", "defaultStatus": "unknown", "cpes": ["cpe:/a:redhat:jboss_enterprise_bpms_platform:7"]}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2024:0494", "name": "RHSA-2024:0494", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/errata/RHSA-2024:0495", "name": "RHSA-2024:0495", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/security/cve/CVE-2023-5675", "tags": ["vdb-entry", "x_refsource_REDHAT"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245197", "name": "RHBZ#2245197", "tags": ["issue-tracking", "x_refsource_REDHAT"]}], "datePublic": "2024-01-24T00:00:00.000Z", "problemTypes": [{"descriptions": [{"cweId": "CWE-285", "description": "Improper Authorization", "lang": "en", "type": "CWE"}]}], "x_redhatCweChain": "CWE-285: Improper Authorization", "workarounds": [{"lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}], "timeline": [{"lang": "en", "time": "2023-10-16T00:00:00+00:00", "value": "Reported to Red Hat."}, {"lang": "en", "time": "2024-01-24T00:00:00+00:00", "value": "Made public."}], "credits": [{"lang": "en", "value": "This issue was discovered by Michal Vav\u0159\u00edk (Red Hat)."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-03-03T16:28:38.788Z"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-04-25T19:40:04.917288Z", "id": "CVE-2023-5675", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-18T18:37:54.897Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T08:07:32.514Z"}, "title": "CVE Program Container", "references": [{"url": "https://access.redhat.com/errata/RHSA-2024:0494", "name": "RHSA-2024:0494", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2024:0495", "name": "RHSA-2024:0495", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/security/cve/CVE-2023-5675", "tags": ["vdb-entry", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245197", "name": "RHBZ#2245197", "tags": ["issue-tracking", "x_refsource_REDHAT", "x_transferred"]}]}]}}