First published: Wed Jun 03 2015(Updated: )
Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.camel:camel-core | >=2.14.0<2.14.2 | 2.14.2 |
maven/org.apache.camel:camel-core | <2.13.4 | 2.13.4 |
Red Hat Build of Apache Camel | <=2.13.3 | |
Red Hat Build of Apache Camel | =2.14.0 | |
Red Hat Build of Apache Camel | =2.14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0264 is classified as a medium severity vulnerability due to its potential to allow unauthorized file access.
To fix CVE-2015-0264, update Apache Camel to version 2.13.4 or 2.14.2 or later.
Affected versions of Apache Camel include versions prior to 2.13.4 and 2.14.0 through 2.14.1.
Exploitation of CVE-2015-0264 allows attackers to read arbitrary files on the server by manipulating XML input.
CVE-2015-0264 specifically affects users of Apache Camel versions 2.13.3 and below, and 2.14.0 and 2.14.1.