Douglas Mendizabal discovered that Barbican incorrectly handled certain query strings. A remote attacker could possibly use this issue to bypass the access policy.
{ "availability": "No subscription required", "binaries": [ { "barbican-doc": "1:6.0.1-0ubuntu1.2", "barbican-api": "1:6.0.1-0ubuntu1.2", "barbican-common": "1:6.0.1-0ubuntu1.2", "barbican-keystone-listener": "1:6.0.1-0ubuntu1.2", "barbican-worker": "1:6.0.1-0ubuntu1.2", "python-barbican": "1:6.0.1-0ubuntu1.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "barbican-api": "1:10.1.0-0ubuntu2.2", "barbican-worker": "1:10.1.0-0ubuntu2.2", "barbican-common": "1:10.1.0-0ubuntu2.2", "barbican-keystone-listener": "1:10.1.0-0ubuntu2.2", "python3-barbican": "1:10.1.0-0ubuntu2.2", "barbican-doc": "1:10.1.0-0ubuntu2.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "barbican-api": "2:14.0.0-0ubuntu1.1", "barbican-worker": "2:14.0.0-0ubuntu1.1", "barbican-common": "2:14.0.0-0ubuntu1.1", "barbican-keystone-listener": "2:14.0.0-0ubuntu1.1", "python3-barbican": "2:14.0.0-0ubuntu1.1", "barbican-doc": "2:14.0.0-0ubuntu1.1" } ] }