{
  "threat_severity" : "Moderate",
  "public_date" : "2022-11-28T00:00:00Z",
  "bugzilla" : {
    "description" : "quarkus-vertx-http: Security misconfiguration of CORS : OWASP A05_2021 level in Quarkus",
    "id" : "2148867",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2148867"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-1026",
  "details" : [ "Quarkus CORS filter allows simple GET and POST requests with invalid Origin to proceed. Simple GET or POST requests made with XMLHttpRequest are the ones which have no event listeners registered on the object returned by the XMLHttpRequest upload property and have no ReadableStream object used in the request.", "A vulnerability was found in Quarkus. The Quarkus CORS filter allows simple GET and POST requests with an invalid Origin to proceed. Simple GET or POST requests made with XMLHttpRequest have no event listeners registered on the object returned by the XMLHttpRequest upload property, and have no ReadableStream object used in the request." ],
  "affected_release" : [ {
    "product_name" : "Red Hat build of Quarkus 2.13.5",
    "release_date" : "2022-12-14T00:00:00Z",
    "advisory" : "RHSA-2022:9023",
    "cpe" : "cpe:/a:redhat:quarkus:2.13"
  }, {
    "product_name" : "Red Hat build of Quarkus Platform 2.7.6.SP3",
    "release_date" : "2022-12-13T00:00:00Z",
    "advisory" : "RHSA-2022:8957",
    "cpe" : "cpe:/a:redhat:quarkus:2.7",
    "package" : "quarkus-vertx-http"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-4147\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-4147" ],
  "name" : "CVE-2022-4147",
  "csaw" : false
}