Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
Quarkus
Source
secalert@redhat.com
Tags
CVE-2024-1726 details
Published : April 25, 2024, 5:15 p.m.
Last Modified : April 25, 2024, 5:24 p.m.
Last Modified : April 25, 2024, 5:24 p.m.
Description
A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.
CVSS Score
1 | 2 | 3 | 4 | 5.3 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
Base Score
5.3
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References
URL | Source |
---|---|
https://access.redhat.com/errata/RHSA-2024:1662 | secalert@redhat.com |
https://access.redhat.com/security/cve/CVE-2024-1726 | secalert@redhat.com |
https://bugzilla.redhat.com/show_bug.cgi?id=2265158 | secalert@redhat.com |
This website uses the NVD API, but is not approved or certified by it.