Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5348

Опубликовано: 17 дек. 2015
Источник: redhat
CVSS3: 3.7
CVSS2: 4.3
EPSS Низкий

Описание

Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.

It was found that Apache Camel's Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability. If using camel-jetty, or camel-servlet as a consumer in Camel routes, then Camel will automatically de-serialize HTTP requests that uses the content-header: application/x-java-serialized-object.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Enterprise 1camelAffected
Red Hat BPM Suite 6CamelNot affected
Red Hat JBoss BRMS 6CamelNot affected
Red Hat JBoss Enterprise Web Server 1amq-6Affected
Red Hat JBoss Enterprise Web Server 1fuse-6Affected
Red Hat JBoss Enterprise Web Server 1fuse-esb-7Will not fix
Red Hat JBoss Enterprise Web Server 1fuse-mq-7Will not fix
Red Hat JBoss Fuse Service Works 6CamelAffected
Red Hat OpenShift Enterprise 2camelAffected
Red Hat JBoss Fuse 6.3FixedRHSA-2016:203506.10.2016

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1292849Camel: Java object deserialisation in Jetty/Servlet

EPSS

Процентиль: 91%
0.06832
Низкий

3.7 Low

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
nvd
почти 10 лет назад

Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.

CVSS3: 8.1
github
больше 7 лет назад

Apache Camel can allow remote attackers to execute arbitrary commands

EPSS

Процентиль: 91%
0.06832
Низкий

3.7 Low

CVSS3

4.3 Medium

CVSS2