A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3324 | A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data. |
Github GHSA |
GHSA-xfv5-jqgp-vqhj | Quarkus Cache Runtime exposes sensitive information to an unauthorized actor |
Fixes
Solution
No solution given by the vendor.
Workaround
No mitigation is currently available for this flaw.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-09T23:57:27.927Z
Reserved: 2023-11-30T03:30:16.241Z
Link: CVE-2023-6393
No data.
Status : Modified
Published: 2023-12-06T17:15:07.377
Modified: 2024-11-21T08:43:46.267
Link: CVE-2023-6393
OpenCVE Enrichment
No data.
EUVD
Github GHSA