First published: Wed Jan 08 2014(Updated: )
It was found that the Apache Camel XSLT component would resolve entities in XML messages when transforming them using an xslt: route. A remote attacker able to submit messages to an xslt: Camel route could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.camel:camel-core | >=2.12.0<2.12.3 | 2.12.3 |
maven/org.apache.camel:camel-core | <2.11.4 | 2.11.4 |
Red Hat Build of Apache Camel | <=2.11.3 | |
Red Hat Build of Apache Camel | =1.0.0 | |
Red Hat Build of Apache Camel | =1.1.0 | |
Red Hat Build of Apache Camel | =1.2.0 | |
Red Hat Build of Apache Camel | =1.3.0 | |
Red Hat Build of Apache Camel | =1.4.0 | |
Red Hat Build of Apache Camel | =1.5.0 | |
Red Hat Build of Apache Camel | =1.6.0 | |
Red Hat Build of Apache Camel | =1.6.1 | |
Red Hat Build of Apache Camel | =1.6.2 | |
Red Hat Build of Apache Camel | =1.6.3 | |
Red Hat Build of Apache Camel | =1.6.4 | |
Red Hat Build of Apache Camel | =2.0.0 | |
Red Hat Build of Apache Camel | =2.0.0-milestone1 | |
Red Hat Build of Apache Camel | =2.0.0-milestone2 | |
Red Hat Build of Apache Camel | =2.0.0-milestone3 | |
Red Hat Build of Apache Camel | =2.1.0 | |
Red Hat Build of Apache Camel | =2.10.0 | |
Red Hat Build of Apache Camel | =2.10.1 | |
Red Hat Build of Apache Camel | =2.10.2 | |
Red Hat Build of Apache Camel | =2.10.3 | |
Red Hat Build of Apache Camel | =2.10.4 | |
Red Hat Build of Apache Camel | =2.10.5 | |
Red Hat Build of Apache Camel | =2.10.6 | |
Red Hat Build of Apache Camel | =2.10.7 | |
Red Hat Build of Apache Camel | =2.11.0 | |
Red Hat Build of Apache Camel | =2.11.1 | |
Red Hat Build of Apache Camel | =2.11.2 | |
Red Hat Build of Apache Camel | =2.12.0 | |
Red Hat Build of Apache Camel | =2.12.1 | |
Red Hat Build of Apache Camel | =2.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0002 is classified as a critical vulnerability because it allows remote attackers to read arbitrary files on the server.
To address CVE-2014-0002, upgrade the Apache Camel software to version 2.11.4 or 2.12.3 or later.
CVE-2014-0002 affects Apache Camel versions up to and including 2.11.3 and versions 1.0.0 through 2.11.3.
CVE-2014-0002 can be exploited by an attacker who can submit XML messages to an xslt: route, leading to potential file disclosure.
There are no specific mitigations; the best practice is to apply the fix by upgrading to the recommended versions.