Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. io.quarkus.http/quarkus-http-core
  4. ›
  5. CVE-2024-12397

CVE-2024-12397: io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling

December 12, 2024 (updated March 20, 2025)

A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.

References

  • access.redhat.com/errata/RHSA-2025:0900
  • access.redhat.com/errata/RHSA-2025:1082
  • access.redhat.com/errata/RHSA-2025:3018
  • access.redhat.com/security/cve/CVE-2024-12397
  • bugzilla.redhat.com/show_bug.cgi?id=2331298
  • github.com/advisories/GHSA-cxrx-q234-m22m
  • github.com/quarkusio/quarkus-http
  • github.com/quarkusio/quarkus-http/commit/cfc99d80fce2e3a3dbf06972e648e79e925a7ae7
  • github.com/quarkusio/quarkus-http/pull/170
  • nvd.nist.gov/vuln/detail/CVE-2024-12397

Code Behaviors & Features

Detect and mitigate CVE-2024-12397 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.3.4

Fixed versions

  • 5.3.4

Solution

Upgrade to version 5.3.4 or above.

Impact 7.4 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Source file

maven/io.quarkus.http/quarkus-http-core/CVE-2024-12397.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:15 +0000.