First published: Wed Jan 08 2014(Updated: )
It was found that the Apache Camel XSLT component allowed XSL stylesheets to perform calls to external Java methods. A remote attacker able to submit messages to an xslt: Camel route could use this flaw to perform arbitrary remote code execution in the context of the Camel server process.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.camel:camel-core | >=2.12.0<2.12.3 | 2.12.3 |
maven/org.apache.camel:camel-core | >=2.11.0<2.11.4 | 2.11.4 |
Red Hat Build of Apache Camel | <=2.11.3 | |
Red Hat Build of Apache Camel | =1.0.0 | |
Red Hat Build of Apache Camel | =1.1.0 | |
Red Hat Build of Apache Camel | =1.2.0 | |
Red Hat Build of Apache Camel | =1.3.0 | |
Red Hat Build of Apache Camel | =1.4.0 | |
Red Hat Build of Apache Camel | =1.5.0 | |
Red Hat Build of Apache Camel | =1.6.0 | |
Red Hat Build of Apache Camel | =1.6.1 | |
Red Hat Build of Apache Camel | =1.6.2 | |
Red Hat Build of Apache Camel | =1.6.3 | |
Red Hat Build of Apache Camel | =1.6.4 | |
Red Hat Build of Apache Camel | =2.0.0 | |
Red Hat Build of Apache Camel | =2.0.0-milestone1 | |
Red Hat Build of Apache Camel | =2.0.0-milestone2 | |
Red Hat Build of Apache Camel | =2.0.0-milestone3 | |
Red Hat Build of Apache Camel | =2.1.0 | |
Red Hat Build of Apache Camel | =2.10.0 | |
Red Hat Build of Apache Camel | =2.10.1 | |
Red Hat Build of Apache Camel | =2.10.2 | |
Red Hat Build of Apache Camel | =2.10.3 | |
Red Hat Build of Apache Camel | =2.10.4 | |
Red Hat Build of Apache Camel | =2.10.5 | |
Red Hat Build of Apache Camel | =2.10.6 | |
Red Hat Build of Apache Camel | =2.10.7 | |
Red Hat Build of Apache Camel | =2.11.0 | |
Red Hat Build of Apache Camel | =2.11.1 | |
Red Hat Build of Apache Camel | =2.11.2 | |
Red Hat Build of Apache Camel | =2.12.0 | |
Red Hat Build of Apache Camel | =2.12.1 | |
Red Hat Build of Apache Camel | =2.12.2 | |
<=2.11.3 | ||
=1.0.0 | ||
=1.1.0 | ||
=1.2.0 | ||
=1.3.0 | ||
=1.4.0 | ||
=1.5.0 | ||
=1.6.0 | ||
=1.6.1 | ||
=1.6.2 | ||
=1.6.3 | ||
=1.6.4 | ||
=2.0.0 | ||
=2.0.0-milestone1 | ||
=2.0.0-milestone2 | ||
=2.0.0-milestone3 | ||
=2.1.0 | ||
=2.10.0 | ||
=2.10.1 | ||
=2.10.2 | ||
=2.10.3 | ||
=2.10.4 | ||
=2.10.5 | ||
=2.10.6 | ||
=2.10.7 | ||
=2.11.0 | ||
=2.11.1 | ||
=2.11.2 | ||
=2.12.0 | ||
=2.12.1 | ||
=2.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-0003 is considered critical due to the potential for arbitrary remote code execution.
To fix CVE-2014-0003, upgrade Apache Camel to version 2.11.4 or higher, or to version 2.12.3 or higher.
CVE-2014-0003 affects Apache Camel versions 1.0.0 up to and including 2.11.3.
CVE-2014-0003 is a remote code execution vulnerability that allows attackers to execute arbitrary code on the server.
Yes, CVE-2014-0003 can be exploited remotely by an attacker who can submit messages to an XSLT Camel route.