Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5348

Опубликовано: 17 дек. 2015
Источник: redhat
CVSS3: 3.7
CVSS2: 4.3
EPSS Низкий

Описание

Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.

It was found that Apache Camel's Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability. If using camel-jetty, or camel-servlet as a consumer in Camel routes, then Camel will automatically de-serialize HTTP requests that uses the content-header: application/x-java-serialized-object.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Enterprise 1camelAffected
Red Hat BPM Suite 6CamelNot affected
Red Hat JBoss BRMS 6CamelNot affected
Red Hat JBoss Fuse Service Works 6CamelAffected
Red Hat OpenShift Enterprise 2camelAffected
Red Hat JBoss Fuse 6.3FixedRHSA-2016:203506.10.2016

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1292849Camel: Java object deserialisation in Jetty/Servlet

EPSS

Процентиль: 91%
0.06832
Низкий

3.7 Low

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
nvd
почти 10 лет назад

Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.

CVSS3: 8.1
github
больше 7 лет назад

Apache Camel can allow remote attackers to execute arbitrary commands

EPSS

Процентиль: 91%
0.06832
Низкий

3.7 Low

CVSS3

4.3 Medium

CVSS2