Vulnerability Description
A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build system within the application.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quarkus | Quarkus | >= 3.0.1, < 3.2.8 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2023-5720Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2245700Issue TrackingVendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-5720Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2245700Issue TrackingVendor Advisory
FAQ
What is CVE-2023-5720?
CVE-2023-5720 is a vulnerability with a CVSS score of 7.7 (HIGH). A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access ...
How severe is CVE-2023-5720?
CVE-2023-5720 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5720?
Check the references section above for vendor advisories and patch information. Affected products include: Quarkus Quarkus.