In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources. https://spring.io/security/cve-2023-34062
depcli -a reactor-netty-http eap-7/reactor-netty-http=new eap-8/reactor-netty-http=new eap-xp/reactor-netty-http=new fuse-7/reactor-netty-http=new rhint-camel-k-1/reactor-netty-http=new rhint-camel-spring-boot-3/reactor-netty-http=new rhint-camel-spring-boot-4/reactor-netty-http=new rhint-debezium-2/reactor-netty-http=new rhos_devspaces-3/devspaces-pluginregistry-rhel8-container=new