An improper input validation of the p2c parameter in the Apache CXF JOSE code before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform a denial of service attack by specifying a large value for this parameter in a token.
This issue has been addressed in the following products: Red Hat build of Apache Camel 3.20.7 for Spring Boot Via RHSA-2024:6883 https://access.redhat.com/errata/RHSA-2024:6883
This issue has been addressed in the following products: Red Hat build of Apache Camel for Quarkus 2.13 Via RHSA-2024:7052 https://access.redhat.com/errata/RHSA-2024:7052