Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6393: Exposure of Sensitive Information to an Unauthorized Actor in Red Hat Red Hat build of Quarkus 2.13.9.Final

0
Medium
VulnerabilityCVE-2023-6393cvecve-2023-6393
Published: Wed Dec 06 2023 (12/06/2023, 16:58:54 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Quarkus 2.13.9.Final

Description

A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.

AI-Powered Analysis

AILast updated: 11/20/2025, 18:46:30 UTC

Technical Analysis

CVE-2023-6393 is a vulnerability identified in the Red Hat build of Quarkus version 2.13.9.Final, specifically within the Quarkus Cache Runtime component. The issue arises when request processing involves a Uni object cached using the @CacheResult annotation. Normally, each request should process within its own context to ensure data isolation. However, due to this flaw, the cached Uni reuses the initial completion context instead of switching to the current request's context. This means that when a POST request is processed, it may inadvertently return a cached response that contains sensitive information from a previous user’s request. This behavior leads to unauthorized exposure of sensitive data to malicious actors who can craft requests to retrieve data not intended for them. The vulnerability affects confidentiality but does not impact data integrity or system availability. The CVSS v3.1 score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires low privileges, and no user interaction, but has a high impact on confidentiality. There are no known exploits in the wild at the time of publication. The flaw is particularly relevant for applications using Quarkus for microservices or cloud-native deployments where caching is leveraged for performance optimization. Without proper mitigation, this vulnerability could lead to data leaks between users in multi-tenant or shared environments.

Potential Impact

For European organizations, the primary impact of CVE-2023-6393 is the unauthorized disclosure of sensitive information, which can lead to data breaches and non-compliance with data protection regulations such as the GDPR. Exposure of personal data or confidential business information could result in reputational damage, regulatory fines, and loss of customer trust. Organizations relying on Red Hat Quarkus for critical applications, especially those handling personal or financial data, are at risk. The vulnerability could be exploited remotely over the network with low privileges, increasing the attack surface. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone is significant for sectors like finance, healthcare, and government services prevalent in Europe. The risk is heightened in multi-tenant cloud environments or SaaS platforms where cached responses might be shared across users. Consequently, European entities must assess their use of affected Quarkus versions and implement mitigations promptly to avoid potential data leaks.

Mitigation Recommendations

To mitigate CVE-2023-6393, organizations should first apply any available patches or updates from Red Hat or the Quarkus project that address the caching context reuse issue. If patches are not immediately available, consider disabling caching for Uni objects annotated with @CacheResult in sensitive contexts or avoid caching POST request responses that may contain user-specific data. Implement strict access controls and monitoring around services using Quarkus caching to detect anomalous access patterns. Review application logic to ensure that cached data does not include sensitive information or that context switching is correctly handled per request. Employ network segmentation and firewall rules to limit exposure of vulnerable services to trusted networks only. Additionally, conduct thorough testing of caching behavior in staging environments to verify that context isolation is maintained. Finally, maintain an incident response plan to quickly address any suspected data exposure incidents related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-11-30T03:30:16.241Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e84e5dba0e608b4fb0c527

Added to database: 10/10/2025, 12:07:57 AM

Last enriched: 11/20/2025, 6:46:30 PM

Last updated: 11/29/2025, 11:41:23 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats