A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1194 A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured.
Github GHSA Github GHSA GHSA-f8h5-v2vg-46rr quarkus-core leaks local environment variables from Quarkus namespace during application's build
Fixes

Solution

No solution given by the vendor.


Workaround

Currently, no mitigation is available for this vulnerability. Please update as the patches become available.

History

Thu, 19 Jun 2025 03:15:00 +0900

Type Values Removed Values Added
First Time appeared Redhat apache Camel Hawtio
CPEs cpe:/a:redhat:apache_camel_hawtio:4
Vendors & Products Redhat apache Camel Hawtio

Fri, 13 Dec 2024 07:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhboac_hawtio:4 cpe:/a:redhat:rhboac_hawtio:4.0.0
References

Fri, 20 Sep 2024 05:30:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 17:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak:22 cpe:/a:redhat:build_keycloak:

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-07T10:50:22.276Z

Reserved: 2024-03-20T01:39:49.992Z

Link: CVE-2024-2700

cve-icon Vulnrichment

Updated: 2024-08-01T19:18:48.249Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-04T14:15:09.950

Modified: 2024-12-12T22:15:07.877

Link: CVE-2024-2700

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-04-03T00:00:00Z

Links: CVE-2024-2700 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses