{"api_version":"1","generated_at":"2026-04-22T22:40:43+00:00","cve":"CVE-2023-1584","urls":{"html":"https://cve.report/CVE-2023-1584","api":"https://cve.report/api/cve/CVE-2023-1584.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1584","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1584"},"summary":{"title":"CVE-2023-1584","description":"A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the access token to access user data from OIDC provider services. Please note that passwords are not stored in access tokens.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2023-10-04 11:15:00","updated_at":"2023-11-07 04:04:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2023-1584","name":"https://access.redhat.com/security/cve/CVE-2023-1584","refsource":"MISC","tags":[],"title":"cve-details","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2023:3809","name":"https://access.redhat.com/errata/RHSA-2023:3809","refsource":"MISC","tags":[],"title":"Red Hat","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/quarkusio/quarkus/pull/32192","name":"https://github.com/quarkusio/quarkus/pull/32192","refsource":"MISC","tags":[],"title":"Encrypt OIDC session cookie value by default by sberyozkin · Pull Request #32192 · quarkusio/quarkus · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/quarkusio/quarkus/pull/33414","name":"https://github.com/quarkusio/quarkus/pull/33414","refsource":"MISC","tags":[],"title":"2.13: Encrypt OIDC session cookie value by default by sberyozkin · Pull Request #33414 · quarkusio/quarkus · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180886","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2180886","refsource":"MISC","tags":[],"title":"2180886 – (CVE-2023-1584) CVE-2023-1584 quarkus-oidc: ID and access tokens leak via the authorization code flow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1584","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1584","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1584","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"quarkus","cpe5":"quarkus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-1584","qid":"995501","title":"Java (Maven) Security Update for io.quarkus:quarkus-oidc (GHSA-6hc9-cf8x-hf83)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1584","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the access token to access user data from OIDC provider services. Please note that passwords are not stored in access tokens."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"quarkus-oidc","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"version":"3.1.0.CR1","status":"unaffected"}]}}]}}]}},{"vendor_name":"Red Hat","product":{"product_data":[{"product_name":"Red Hat build of Quarkus","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}}]}},{"product_name":"Red Hat Integration Service Registry","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"affected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://access.redhat.com/errata/RHSA-2023:3809","refsource":"MISC","name":"https://access.redhat.com/errata/RHSA-2023:3809"},{"url":"https://access.redhat.com/security/cve/CVE-2023-1584","refsource":"MISC","name":"https://access.redhat.com/security/cve/CVE-2023-1584"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180886","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2180886"},{"url":"https://github.com/quarkusio/quarkus/pull/32192","refsource":"MISC","name":"https://github.com/quarkusio/quarkus/pull/32192"},{"url":"https://github.com/quarkusio/quarkus/pull/33414","refsource":"MISC","name":"https://github.com/quarkusio/quarkus/pull/33414"}]},"credits":[{"lang":"en","value":"This issue was discovered by Paulo Lopes (Red Hat)."}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-04 11:15:00","lastModifiedDate":"2023-11-07 04:04:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*","versionEndExcluding":"2.13.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}