logo

CVE-2016-8749 org.apache.camel:camel-jackson

Package

Manager: maven
Name: org.apache.camel:camel-jackson
Vulnerable Version: >=0 <2.16.5 || >=2.17.0 <2.17.5 || >=2.18.0 <2.18.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.07394 pctl0.9136

Details

Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks Apache Camel's camel-jackson and camel-jacksonxml components are vulnerable to Java object de-serialisation vulnerability. Camel allows to specify such a type through the 'CamelJacksonUnmarshalType' property. De-serializing untrusted data can lead to security flaws as demonstrated in various similar reports about Java de-serialization issues. Mitigation: 2.16.x users should upgrade to 2.16.5, 2.17.x users should upgrade to 2.17.5, 2.18.x users should upgrade to 2.18.2. The JIRA tickets: https://issues.apache.org/jira/browse/CAMEL-10567 and https://issues.apache.org/jira/browse/CAMEL-10604 refers to the various commits that resovoled the issue, and have more details.

Metadata

Created: 2018-10-16T23:13:00Z
Modified: 2023-12-19T23:04:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-vvjc-q5vr-52q6/GHSA-vvjc-q5vr-52q6.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-vvjc-q5vr-52q6
Finding: F096
Auto approve: 1