Information Exposure Through Environmental Variables Affecting io.quarkus:quarkus-core-deployment package, versions [,3.2.11)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-IOQUARKUS-6596815
  • published 11 Apr 2024
  • disclosed 4 Apr 2024
  • credit Unknown

How to fix?

Upgrade io.quarkus:quarkus-core-deployment to version 3.2.11 or higher.

Overview

io.quarkus:quarkus-core-deployment is a Cloud Native, (Linux) Container First framework for writing Java applications

Affected versions of this package are vulnerable to Information Exposure Through Environmental Variables due to the capture of local environment variables from the Quarkus namespace during the application's build process. Running the resulting application inherits the values captured at build time, which may include environment variables or .env facility configurations set for testing purposes. This can lead to unintended behaviour, such as dropping the database during application startup or trusting all TLS certificates, if these values are not overridden.

Note:

This behaviour only happens for configuration properties from the quarkus.* namespace. So, application-specific properties are not captured.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7 high
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High