{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T07:50:19.045","vulnerabilities":[{"cve":{"id":"CVE-2023-4853","sourceIdentifier":"secalert@redhat.com","published":"2023-09-20T10:15:14.947","lastModified":"2024-11-21T08:36:06.910","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service."},{"lang":"es","value":"Se encontró una falla en Quarkus donde las políticas de seguridad HTTP no sanitiza correctamente ciertas permutaciones de caracteres al aceptar solicitudes, lo que resulta en una evaluación incorrecta de los permisos. Este problema podría permitir que un atacante eluda la política de seguridad por completo, lo que resultaría en un acceso no autorizado al endpoint y posiblemente una Denegación de Servicio."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-148"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*","versionEndExcluding":"2.16.11","matchCriteriaId":"F1985AD9-735A-4BBB-8E7B-B3271DC601C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.0","versionEndExcluding":"3.2.6","matchCriteriaId":"B7A7D975-A081-4FA5-A97A-B430102325ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndExcluding":"3.3.3","matchCriteriaId":"F51936A7-39F2-42F4-87C5-D99445652F6B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*","matchCriteriaId":"1D54F5AE-61EC-4434-9D5F-9394A3979894"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:build_of_quarkus:*:*:*:*:text-only:*:*:*","versionStartIncluding":"2.13.0","versionEndExcluding":"2.13.8","matchCriteriaId":"ACCC2DC7-4127-4429-BC5B-C555458D790A"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*","matchCriteriaId":"68146098-58F8-417E-B165-5182527117C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:integration_camel_k:*:*:*:*:*:*:*:*","versionEndExcluding":"1.10.2","matchCriteriaId":"176A2C2D-9397-4238-B803-54F60ED795C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*","matchCriteriaId":"F039C746-2001-4EE5-835F-49607A94F12B"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*","matchCriteriaId":"EF03BDE8-602D-4DEE-BA5B-5B20FDF47741"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_middleware:1:*:*:*:*:*:*:*","matchCriteriaId":"1F4A0F87-524E-4935-9B07-93793D8143FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:*","matchCriteriaId":"A0FED4EE-0AE2-4BD8-8DAC-143382E4DB7C"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*","matchCriteriaId":"77675CB7-67D7-44E9-B7FF-D224B3341AA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift_serverless:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C18B8793-52C2-46E2-8752-92552AD4A643"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:process_automation_manager:7.0:*:*:*:*:*:*:*","matchCriteriaId":"4857DA21-9127-4F6A-9DA1-96678D9F9472"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*","matchCriteriaId":"0595C9F8-9C7A-4FC1-B7EE-52978A1B1E93"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*","matchCriteriaId":"EA983F8C-3A06-450A-AEFF-9429DE9A3454"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*","matchCriteriaId":"40449571-22F8-44FA-B57B-B43F71AB25E2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"F4CFF558-3C47-480D-A2F0-BABF26042943"}]}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2023:5170","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5310","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5337","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5446","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5479","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5480","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:6107","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:6112","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:7653","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/security/cve/CVE-2023-4853","source":"secalert@redhat.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://access.redhat.com/security/vulnerabilities/RHSB-2023-002","source":"secalert@redhat.com","tags":["Exploit","Mitigation","Technical Description","Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238034","source":"secalert@redhat.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5170","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5310","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5337","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5446","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5479","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:5480","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:6107","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:6112","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2023:7653","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://access.redhat.com/security/cve/CVE-2023-4853","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]},{"url":"https://access.redhat.com/security/vulnerabilities/RHSB-2023-002","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Technical Description","Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238034","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]}]}}]}