Description
A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured.
Reserved 2024-03-20 | Published 2024-04-04 | Updated 2025-03-03 | Assigner
redhatHIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem types
Cleartext Storage of Sensitive Information in an Environment Variable
Product status
Default status
unaffected
3.8.4
affected
3.2.12
affected
Default status
unaffected
Default status
unaffected
Default status
unaffected
Default status
affected
3.2.12.Final-redhat-00001 before *
unaffected
Default status
affected
3.8.4.redhat-00002 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.12.0-6 before *
unaffected
Default status
affected
1.33.0-4 before *
unaffected
Default status
affected
1.33.0-5 before *
unaffected
Default status
affected
1.33.0-5 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.33.0-6 before *
unaffected
Default status
affected
1.33.0-5 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
1.33.0-4 before *
unaffected
Default status
affected
1.33.0-4 before *
unaffected
Default status
affected
1.12.0-4 before *
unaffected
Default status
affected
Default status
affected
Default status
affected
Default status
affected
Default status
affected
Default status
affected
Timeline
2024-04-03: | Reported to Red Hat. |
2024-04-03: | Made public. |
References
access.redhat.com/errata/RHSA-2024:11023 (RHSA-2024:11023) vendor-advisory
access.redhat.com/errata/RHSA-2024:2106 (RHSA-2024:2106) vendor-advisory
access.redhat.com/errata/RHSA-2024:2705 (RHSA-2024:2705) vendor-advisory
access.redhat.com/errata/RHSA-2024:3527 (RHSA-2024:3527) vendor-advisory
access.redhat.com/errata/RHSA-2024:4028 (RHSA-2024:4028) vendor-advisory
access.redhat.com/errata/RHSA-2024:4873 (RHSA-2024:4873) vendor-advisory
access.redhat.com/security/cve/CVE-2024-2700 vdb-entry
bugzilla.redhat.com/show_bug.cgi?id=2273281 (RHBZ#2273281) issue-tracking
cve.org (CVE-2024-2700)
nvd.nist.gov (CVE-2024-2700)
Download JSON