Quarkus Cache Runtime exposes sensitive information to an unauthorized actor
Moderate severity
GitHub Reviewed
Published
Dec 6, 2023
to the GitHub Advisory Database
•
Updated Aug 2, 2024
Package
Affected versions
>= 3.3.0.CR1, < 3.5.2
>= 3.2.0.CR1, < 3.2.9.Final
Patched versions
3.5.2
3.2.9.Final
Description
Published by the National Vulnerability Database
Dec 6, 2023
Published to the GitHub Advisory Database
Dec 6, 2023
Reviewed
Dec 6, 2023
Last updated
Aug 2, 2024
A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.
References