CVE-2023-3629

A flaw was found in Infinispan's REST, Cache retrieval endpoints do not properly evaluate the necessary admin permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:data_grid:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*

Configuration 3 (hide)

cpe:2.3:a:redhat:jboss_enterprise_application_platform:6:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:infinispan:infinispan:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:17

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 4.3
References
  • () https://security.netapp.com/advisory/ntap-20240125-0004/ -
References () https://access.redhat.com/errata/RHSA-2023:5396 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:5396 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-3629 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-3629 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2217926 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2217926 - Issue Tracking

16 Sep 2024, 14:15

Type Values Removed Values Added
References
  • {'url': 'https://security.netapp.com/advisory/ntap-20240125-0004/', 'source': 'secalert@redhat.com'}

25 Jan 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240125-0004/ -

29 Dec 2023, 22:48

Type Values Removed Values Added
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 6.5
First Time Infinispan
Infinispan infinispan
Redhat
Redhat jboss Data Grid
Redhat data Grid
Redhat jboss Enterprise Application Platform
References () https://access.redhat.com/errata/RHSA-2023:5396 - () https://access.redhat.com/errata/RHSA-2023:5396 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-3629 - () https://access.redhat.com/security/cve/CVE-2023-3629 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2217926 - () https://bugzilla.redhat.com/show_bug.cgi?id=2217926 - Issue Tracking
CPE cpe:2.3:a:infinispan:infinispan:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:data_grid:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6:*:*:*:*:*:*:*
Summary
  • (es) Se encontró una falla en REST de Infinispan: los endpoints de recuperación de caché no evalúan adecuadamente los permisos de administrador necesarios para la operación. Este problema podría permitir que un usuario autenticado acceda a información fuera de sus permisos previstos.

18 Dec 2023, 15:04

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-18 14:15

Updated : 2024-11-21 08:17


NVD link : CVE-2023-3629

Mitre link : CVE-2023-3629

CVE.ORG link : CVE-2023-3629


JSON object : View

Products Affected

redhat

  • data_grid
  • jboss_enterprise_application_platform
  • jboss_data_grid

infinispan

  • infinispan
CWE
CWE-304

Missing Critical Step in Authentication

NVD-CWE-Other