Information Exposure Through Environmental Variables Affecting io.quarkus:quarkus-core-deployment package, versions [,3.2.11)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-IOQUARKUS-6596815
  • published11 Apr 2024
  • disclosed4 Apr 2024
  • creditUnknown

Introduced: 4 Apr 2024

CVE-2024-2700  (opens in a new tab)
CWE-526  (opens in a new tab)

How to fix?

Upgrade io.quarkus:quarkus-core-deployment to version 3.2.11 or higher.

Overview

io.quarkus:quarkus-core-deployment is a Cloud Native, (Linux) Container First framework for writing Java applications

Affected versions of this package are vulnerable to Information Exposure Through Environmental Variables due to the capture of local environment variables from the Quarkus namespace during the application's build process. Running the resulting application inherits the values captured at build time, which may include environment variables or .env facility configurations set for testing purposes. This can lead to unintended behaviour, such as dropping the database during application startup or trusting all TLS certificates, if these values are not overridden.

Note:

This behaviour only happens for configuration properties from the quarkus.* namespace. So, application-specific properties are not captured.

CVSS Scores

version 3.1