Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-429q-mrc4-38fr

Опубликовано: 23 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 7.1

Описание

Apache Camel Deserializes Untrusted Data in its LevelDB Component

Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component.

The Camel-LevelDB DefaultLevelDBSerializer class deserializes data read from the LevelDB aggregation repository using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. An attacker who can write to the LevelDB database files used by a Camel application can inject a crafted serialized Java object that, when deserialized during normal aggregation repository operations, results in arbitrary code execution in the context of the application. This issue affects Apache Camel: from 4.10.0 before 4.10.8, from 4.14.0 before 4.14.5, from 4.15.0 before 4.18.0.

Users are recommended to upgrade to version 4.18.0, which fixes the issue. For the 4.10.x LTS releases, users are recommended to upgrade to 4.10.9, while for 4.14.x LTS releases, users are recommended to upgrade to 4.14.5

Пакеты

Наименование

org.apache.camel:camel-leveldb

maven
Затронутые версииВерсия исправления

>= 3.0.0, < 4.10.9

4.10.9

Наименование

org.apache.camel:camel-leveldb

maven
Затронутые версииВерсия исправления

>= 4.11.0, < 4.14.5

4.14.5

Наименование

org.apache.camel:camel-leveldb

maven
Затронутые версииВерсия исправления

>= 4.15.0, < 4.18.0

4.18.0

EPSS

Процентиль: 23%
0.00075
Низкий

7.1 High

CVSS4

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 7.8
redhat
около 1 месяца назад

Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component. The Camel-LevelDB DefaultLevelDBSerializer class deserializes data read from the LevelDB aggregation repository using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. An attacker who can write to the LevelDB database files used by a Camel application can inject a crafted serialized Java object that, when deserialized during normal aggregation repository operations, results in arbitrary code execution in the context of the application. This issue affects Apache Camel: from 4.10.0 before 4.10.8, from 4.14.0 before 4.14.5, from 4.15.0 before 4.18.0. Users are recommended to upgrade to version 4.18.0, which fixes the issue. For the 4.10.x LTS releases, users are recommended to upgrade to 4.10.9, while for 4.14.x LTS releases, users are recommended to upgrade to 4.14.5

CVSS3: 8.8
nvd
около 1 месяца назад

Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component. The Camel-LevelDB DefaultLevelDBSerializer class deserializes data read from the LevelDB aggregation repository using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. An attacker who can write to the LevelDB database files used by a Camel application can inject a crafted serialized Java object that, when deserialized during normal aggregation repository operations, results in arbitrary code execution in the context of the application. This issue affects Apache Camel: from 4.10.0 before 4.10.8, from 4.14.0 before 4.14.5, from 4.15.0 before 4.18.0. Users are recommended to upgrade to version 4.18.0, which fixes the issue. For the 4.10.x LTS releases, users are recommended to upgrade to 4.10.9, while for 4.14.x LTS releases, users are recommended to upgrade to 4.14.5

EPSS

Процентиль: 23%
0.00075
Низкий

7.1 High

CVSS4

Дефекты

CWE-502