Douglas Mendizabal discovered that Barbican incorrectly handled certain
query strings. A remote attacker could possibly use this issue to bypass
the access policy.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | python3-barbican | <Â 2:14.0.0-0ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | barbican-api | <Â 2:14.0.0-0ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | barbican-common | <Â 2:14.0.0-0ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | barbican-doc | <Â 2:14.0.0-0ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | barbican-keystone-listener | <Â 2:14.0.0-0ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | barbican-worker | <Â 2:14.0.0-0ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | python3-barbican | <Â 1:10.1.0-0ubuntu2.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | barbican-api | <Â 1:10.1.0-0ubuntu2.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | barbican-common | <Â 1:10.1.0-0ubuntu2.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | barbican-doc | <Â 1:10.1.0-0ubuntu2.2 | UNKNOWN |