cvelist/2025/1xxx/CVE-2025-1247.json
2025-03-03 14:00:34 +00:00

136 lines
5.3 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-1247",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Exposure of Data Element to Wrong Session",
"cweId": "CWE-488"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Build of Apache Camel 4.8 for Quarkus 3.15",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "Red Hat build of Quarkus 3.15.3.SP1",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "Red Hat build of Quarkus 3.8.6.SP3",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:1884",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1884"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1885",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1885"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:2067",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:2067"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-1247",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2025-1247"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345172",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2345172"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
}
]
}
}