
We found results for “”
CVE-2023-0833
Good to know:

Date: September 27, 2023
A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
Language: Java
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Generation of Error Message Containing Sensitive Information
CWE-209Top Fix

Upgrade Version
Upgrade to version womtool - 53;womtool - 50;cromwell - 0.32a;cromwell - 40;merlinthemagic/mtm-signal-api - no_fix;openrefine - no_fix;pyspark - 3.3.2;pyspark - 3.5.0;pyspark - no_fix;pyspark - 3.2.3;GridGain - 8.8.23;sirius-csifingerid - 5.8.2;polozpavlo/allure - no_fix;DapiConnect-Xamarin.Android - 0.1.1;fiji - 20231211;JetBrains.Rider.Frontend4 - 212.0.20210528.200705-eap01;JetBrains.Rider.Frontend4 - 202.0.20200820.182208;flapjack - no_fix;io.fabric8.quickstarts:spring-boot-camel-rhosak:no_fix;io.fabric8.quickstarts:spring-boot-camel-rhosak:no_fix;io.fabric8.quickstarts:spring-boot-camel-rhosak:no_fix;io.fabric8.quickstarts:spring-boot-camel-rhosak:no_fix;com.redhat.fuse.boosters.tracing:greetings-service:no_fix;com.redhat.fuse.boosters.tracing:greetings-service:no_fix;com.redhat.fuse.boosters.tracing:greetings-service:no_fix;io.fabric8.quickstarts:spring-boot-camel-config:no_fix;io.fabric8.quickstarts:spring-boot-camel-config:no_fix;io.fabric8.quickstarts:spring-boot-camel-config:no_fix;io.fabric8.quickstarts:spring-boot-camel-config:no_fix;org.teiid:vdb-base-builder:1.6.0;com.redhat.fuse.boosters:fuse-configmap-booster:no_fix;com.redhat.fuse.boosters:fuse-configmap-booster:no_fix;io.syndesis.server:server-runtime:1.3.5;io.syndesis.server:server-runtime:no_fix;io.syndesis.server:server-runtime:1.13.1;io.syndesis.server:server-runtime:no_fix;io.syndesis.server:server-runtime:no_fix;com.redhat.fuse.boosters.tracing:name-service:no_fix;com.redhat.fuse.boosters.tracing:name-service:no_fix;io.fabric8.quickstarts:spring-boot-camel-singleton-services-kubernetes:no_fix;io.fabric8.quickstarts:spring-boot-camel-singleton-services-kubernetes:no_fix;com.redhat.fuse.boosters:fuse-rest-http-booster:no_fix;com.redhat.fuse.boosters:fuse-rest-http-booster:no_fix;io.syndesis.meta:meta:1.13.1;io.syndesis.meta:meta:1.13.1;com.squareup.okhttp3:okhttp:4.9.2;com.redhat.fuse.quickstarts:spring-boot-camel-xa:no_fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |