CVE-2023-4853
📋 TL;DR
This vulnerability in Quarkus allows attackers to bypass HTTP security policies by using specially crafted character permutations in requests. Affected systems could experience unauthorized access to protected endpoints and potential denial of service. Organizations using vulnerable versions of Quarkus with HTTP security policies enabled are at risk.
💻 Affected Systems
- Quarkus
📦 What is this software?
Jboss Middleware Text Only Advisories by Redhat
View all CVEs affecting Jboss Middleware Text Only Advisories →
Quarkus by Quarkus
Quarkus by Quarkus
Quarkus by Quarkus
⚠️ Risk & Real-World Impact
Worst Case
Complete bypass of all HTTP security policies leading to unauthorized access to sensitive endpoints, data exfiltration, and denial of service through resource exhaustion.
Likely Case
Partial bypass of security policies allowing unauthorized access to some protected endpoints, potentially exposing sensitive data or functionality.
If Mitigated
Limited impact with proper network segmentation, additional authentication layers, and request validation in place.
🎯 Exploit Status
Exploitation requires sending specially crafted HTTP requests with character permutations that bypass security policy evaluation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Quarkus 2.16.6.Final, 3.2.6.Final, or 3.6.4
Vendor Advisory: https://access.redhat.com/errata/RHSA-2023:5170
Restart Required: Yes
Instructions:
1. Identify current Quarkus version. 2. Update to patched version (2.16.6.Final, 3.2.6.Final, or 3.6.4). 3. Restart the Quarkus application. 4. Verify the update was successful.
🔧 Temporary Workarounds
Input Validation Filter
allImplement a custom HTTP filter to sanitize and validate request parameters before security policy evaluation
Implement custom javax.servlet.Filter or equivalent in Quarkus to validate/sanitize request parameters
WAF Rule
allConfigure Web Application Firewall to block requests with suspicious character permutations
Add WAF rule to detect and block patterns like %0A, %0D, %09, %20 in URL parameters
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable Quarkus instances from sensitive systems
- Add additional authentication/authorization layers (API gateway, reverse proxy with auth) in front of Quarkus applications
🔍 How to Verify
Check if Vulnerable:
Check Quarkus version with: java -jar your-app.jar --version or examine pom.xml/gradle.build for Quarkus version
Check Version:
java -jar your-app.jar --version | grep -i quarkus
Verify Fix Applied:
Verify version is 2.16.6.Final, 3.2.6.Final, or 3.6.4 or later. Test security policies with crafted requests containing character permutations.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests with encoded characters (%0A, %0D, %09) accessing protected endpoints
- Security policy evaluation failures or bypasses in application logs
Network Indicators:
- HTTP requests with unusual character sequences in parameters/headers to Quarkus endpoints
- Traffic patterns showing access to previously restricted endpoints
SIEM Query:
source="quarkus" AND ("security policy bypass" OR "unauthorized access" OR "%0A" OR "%0D" OR "%09")
🔗 References
- https://access.redhat.com/errata/RHSA-2023:5170
- https://access.redhat.com/errata/RHSA-2023:5310
- https://access.redhat.com/errata/RHSA-2023:5337
- https://access.redhat.com/errata/RHSA-2023:5446
- https://access.redhat.com/errata/RHSA-2023:5479
- https://access.redhat.com/errata/RHSA-2023:5480
- https://access.redhat.com/errata/RHSA-2023:6107
- https://access.redhat.com/errata/RHSA-2023:6112
- https://access.redhat.com/errata/RHSA-2023:7653
- https://access.redhat.com/security/cve/CVE-2023-4853
- https://access.redhat.com/security/vulnerabilities/RHSB-2023-002
- https://bugzilla.redhat.com/show_bug.cgi?id=2238034
- https://access.redhat.com/errata/RHSA-2023:5170
- https://access.redhat.com/errata/RHSA-2023:5310
- https://access.redhat.com/errata/RHSA-2023:5337
- https://access.redhat.com/errata/RHSA-2023:5446
- https://access.redhat.com/errata/RHSA-2023:5479
- https://access.redhat.com/errata/RHSA-2023:5480
- https://access.redhat.com/errata/RHSA-2023:6107
- https://access.redhat.com/errata/RHSA-2023:6112
- https://access.redhat.com/errata/RHSA-2023:7653
- https://access.redhat.com/security/cve/CVE-2023-4853
- https://access.redhat.com/security/vulnerabilities/RHSB-2023-002
- https://bugzilla.redhat.com/show_bug.cgi?id=2238034