Quarkus using HTTP security policies was found to not sanitize certain character permutations correctly when accepting requests, resulting in problematic request resolution. An attacker could use this flaw to bypass the security policy altogether, resulting in unauthorized information or function access, and possibly even denial of service.
This issue has been addressed in the following products: Red Hat build of Quarkus Via RHSA-2023:5170 https://access.redhat.com/errata/RHSA-2023:5170
This issue has been addressed in the following products: Red Hat Camel Extensions for Quarkus 2.13.3-1 Via RHSA-2023:5310 https://access.redhat.com/errata/RHSA-2023:5310
This issue has been addressed in the following products: RHINT Camel-K-1.10.2 Via RHSA-2023:5337 https://access.redhat.com/errata/RHSA-2023:5337
This issue has been addressed in the following products: Red Hat build of OptaPlanner Text-Only advisories Via RHSA-2023:5446 https://access.redhat.com/errata/RHSA-2023:5446
This issue has been addressed in the following products: Openshift Serverless 1 on RHEL 8 Via RHSA-2023:5479 https://access.redhat.com/errata/RHSA-2023:5479
This issue has been addressed in the following products: RHOSS-1.30-RHEL-8 Via RHSA-2023:5480 https://access.redhat.com/errata/RHSA-2023:5480
This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2023:6107 https://access.redhat.com/errata/RHSA-2023:6107
This issue has been addressed in the following products: RHPAM 7.13.4 async Via RHSA-2023:6112 https://access.redhat.com/errata/RHSA-2023:6112
This issue has been addressed in the following products: RHINT Service Registry 2.5.4 GA Via RHSA-2023:7653 https://access.redhat.com/errata/RHSA-2023:7653