First published: Wed Feb 03 2016(Updated: )
The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.camel:camel-xstream | =2.16.0 | 2.16.1 |
maven/org.apache.camel:camel-xstream | <2.15.5 | 2.15.5 |
Red Hat Build of Apache Camel | <=2.15.4 | |
Red Hat Build of Apache Camel | =2.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5344 has a high severity rating, indicating significant risk due to remote command execution vulnerabilities.
To fix CVE-2015-5344, upgrade to Apache Camel version 2.15.5 or 2.16.1 or later.
The impact of CVE-2015-5344 allows remote attackers to execute arbitrary commands on the affected systems.
Apache Camel versions prior to 2.15.5 and 2.16.0 are affected by CVE-2015-5344.
No, the camel-xstream component is not vulnerable in Apache Camel versions 2.16.1 and above.