CVE-2023-3629: Infinispan REST Server's cache retrieval endpoints do not properly evaluate the necessary admin permissions
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.28914%
CWE
Published
12/30/2023
Updated
11/18/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.infinispan:infinispan-server-rest | maven | >= 15.0.0.Dev01, < 15.0.0.Dev04 | 15.0.0.Dev04 |
| org.infinispan:infinispan-server-rest | maven | < 14.0.18.Final | 14.0.18.Final |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks in cache retrieval endpoints. The GitHub commit diff shows: (1) getDetailResponse() originally serialized the full cache configuration into the response without ADMIN checks (evidenced by the added authorizationManager logic in the patch). (2) getCacheConfig() lacked an ADMIN permission check before fetching the configuration (patched with checkPermission(ADMIN)). Both functions directly handle sensitive cache configuration data and matched the CWE-304 description of missing authentication steps. The added security tests in RESTAuthorizationTest.java further confirm these endpoints were improperly accessible to non-admins.