CVE-2024-2700

ADVISORY - github

Summary

A vulnerability was found in the quarkus-core component. Quarkus captures the local environment variables from the Quarkus namespace during the application's build. Thus, running the resulting application inherits the values captured at build time.

However, some local environment variables may have been set by the developer / CI environment for testing purposes, such as dropping the database during the application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application. It may lead to dangerous behavior if the application does not override these values.

This behavior only happens for configuration properties from the quarkus.* namespace. So, application-specific properties are not captured.

EPSS Score: 0.00037 (0.107)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Cleartext Storage of Sensitive Information in an Environment Variable

ADVISORY - github

Cleartext Storage of Sensitive Information in an Environment Variable

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Cleartext Storage of Sensitive Information in an Environment Variable

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Cleartext Storage of Sensitive Information in an Environment Variable


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in