CVE-2023-5720
Quarkus: build env information disclosure via gradle plugin
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build system within the application.
Se encontró una falla en Quarkus, donde no sanitiza adecuadamente los artefactos creados con el complemento Gradle, lo que permite que permanezca cierta información del sistema de compilación. Esta falla permite a un atacante acceder a información potencialmente confidencial desde el sistema de compilación dentro de la aplicación.
*Credits:
Red Hat would like to thank The Gradle Engineering Team for reporting this issue.
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-10-23 CVE Reserved
- 2023-11-15 CVE Published
- 2024-04-15 First Exploit
- 2024-08-02 CVE Updated
- 2024-11-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-526: Cleartext Storage of Sensitive Information in an Environment Variable
CAPEC
References (5)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/miguelc49/CVE-2023-5720-2 | 2024-04-15 | |
https://github.com/miguelc49/CVE-2023-5720-1 | 2024-04-15 | |
https://github.com/miguelc49/CVE-2023-5720-3 | 2024-04-15 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-5720 | 2023-11-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2245700 | 2023-11-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Quarkus Search vendor "Quarkus" | Quarkus Search vendor "Quarkus" for product "Quarkus" | >= 3.0.1 < 3.2.8 Search vendor "Quarkus" for product "Quarkus" and version " >= 3.0.1 < 3.2.8" | - |
Affected
| ||||||
Quarkus Search vendor "Quarkus" | Quarkus Search vendor "Quarkus" for product "Quarkus" | 3.0.0 Search vendor "Quarkus" for product "Quarkus" and version "3.0.0" | candidate_release1 |
Affected
| ||||||
Quarkus Search vendor "Quarkus" | Quarkus Search vendor "Quarkus" for product "Quarkus" | 3.0.0 Search vendor "Quarkus" for product "Quarkus" and version "3.0.0" | candidate_release2 |
Affected
|