Description
A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.
No analysis available yet.
Remediation
Vendor Workaround
No mitigation is currently available for this flaw.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3324 | A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data. |
Github GHSA |
GHSA-xfv5-jqgp-vqhj | Quarkus Cache Runtime exposes sensitive information to an unauthorized actor |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-20T18:05:48.597Z
Reserved: 2023-11-30T03:30:16.241Z
Link: CVE-2023-6393
No data.
Status : Modified
Published: 2023-12-06T17:15:07.377
Modified: 2024-11-21T08:43:46.267
Link: CVE-2023-6393
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA