Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2700: Cleartext Storage of Sensitive Information in an Environment Variable

0
High
VulnerabilityCVE-2024-2700cvecve-2024-2700
Published: Thu Apr 04 2024 (04/04/2024, 13:46:39 UTC)
Source: CVE Database V5

Description

A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured.

AI-Powered Analysis

AILast updated: 11/07/2025, 11:08:48 UTC

Technical Analysis

CVE-2024-2700 is a vulnerability in the quarkus-core framework component that arises from the way Quarkus handles environment variables during application build time. Specifically, Quarkus captures environment variables prefixed with the quarkus.* namespace from the local environment or .env files during the build process and embeds their values directly into the resulting application artifact. This means that any sensitive information set as environment variables during build—such as database credentials, flags to drop databases, or settings to trust all TLS certificates—becomes part of the built application in cleartext. If the application does not explicitly override these embedded values at runtime, the sensitive data remains exposed and can lead to dangerous behaviors, including unintended database drops or acceptance of untrusted TLS certificates. This vulnerability affects Quarkus versions 3.2.12 and 3.8.4. The CVSS v3.1 score is 7.0 (high), with an attack vector of local (AV:L), requiring low privileges (PR:L), no user interaction (UI:N), and high attack complexity (AC:H). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). There are no known exploits in the wild yet. The vulnerability is limited to configuration properties in the quarkus.* namespace; application-specific properties are not affected. This issue is particularly relevant in CI/CD pipelines or developer environments where environment variables are used for testing or temporary overrides. If such variables contain sensitive or dangerous settings, they risk being embedded in production builds unintentionally.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive configuration data, especially in environments where Quarkus is used for Java application development and deployment. Exposure of sensitive environment variables can lead to unauthorized access to databases, acceptance of untrusted TLS certificates, or inadvertent destructive operations like database drops. This can cause data breaches, service disruptions, and compliance violations under regulations such as GDPR. The vulnerability also threatens availability if critical services are disrupted by embedded destructive flags. Organizations using CI/CD pipelines that inject environment variables during builds are particularly vulnerable, as secrets intended only for testing or development may be embedded into production artifacts. This risk is amplified in sectors with high regulatory scrutiny or critical infrastructure, such as finance, healthcare, and government services. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially given the high impact if exploited.

Mitigation Recommendations

1. Avoid setting sensitive or dangerous environment variables in the quarkus.* namespace during build time, especially in CI/CD or developer environments. 2. Use runtime configuration overrides to ensure that any sensitive or test-related properties embedded at build time are replaced with secure values at application startup. 3. Segregate build and runtime environments strictly to prevent leakage of test or CI environment variables into production builds. 4. Implement secret management solutions that inject sensitive configuration only at runtime rather than build time. 5. Monitor and audit build environments for unintended environment variables in the quarkus.* namespace. 6. Upgrade to patched versions of Quarkus once available, or apply vendor-provided patches promptly. 7. Educate developers and DevOps teams about the risks of embedding sensitive environment variables in build artifacts. 8. Review application build processes to ensure no sensitive data is captured inadvertently. 9. Consider scanning built artifacts for embedded secrets as part of security validation before deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-03-20T01:39:49.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690dcfa5c2e5047ad741866f

Added to database: 11/7/2025, 10:53:25 AM

Last enriched: 11/7/2025, 11:08:48 AM

Last updated: 11/8/2025, 12:24:31 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats