First published: Fri Apr 15 2016(Updated: )
Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.camel:camel-ahc | =2.16.0 | 2.16.1 |
maven/org.apache.camel:camel-ahc | <2.15.5 | 2.15.5 |
maven/org.apache.camel:camel-http4 | =2.16.0 | 2.16.1 |
maven/org.apache.camel:camel-http4 | <2.15.5 | 2.15.5 |
maven/org.apache.camel:camel-http-common | =2.16.0 | 2.16.1 |
maven/org.apache.camel:camel-http-common | <2.15.5 | 2.15.5 |
maven/org.apache.camel:camel-http | =2.16.0 | 2.16.1 |
maven/org.apache.camel:camel-http | <2.15.5 | 2.15.5 |
maven/org.apache.camel:camel-servlet | =2.16.0 | 2.16.1 |
maven/org.apache.camel:camel-servlet | <2.15.5 | 2.15.5 |
maven/org.apache.camel:camel-jetty | =2.16.0 | 2.16.1 |
maven/org.apache.camel:camel-jetty | <2.15.5 | 2.15.5 |
Red Hat Build of Apache Camel | =2.6.0 | |
Red Hat Build of Apache Camel | =2.7.0 | |
Red Hat Build of Apache Camel | =2.7.1 | |
Red Hat Build of Apache Camel | =2.7.2 | |
Red Hat Build of Apache Camel | =2.7.3 | |
Red Hat Build of Apache Camel | =2.7.4 | |
Red Hat Build of Apache Camel | =2.7.5 | |
Red Hat Build of Apache Camel | =2.8.0 | |
Red Hat Build of Apache Camel | =2.8.1 | |
Red Hat Build of Apache Camel | =2.8.2 | |
Red Hat Build of Apache Camel | =2.8.3 | |
Red Hat Build of Apache Camel | =2.8.4 | |
Red Hat Build of Apache Camel | =2.8.5 | |
Red Hat Build of Apache Camel | =2.8.6 | |
Red Hat Build of Apache Camel | =2.9.0 | |
Red Hat Build of Apache Camel | =2.9.1 | |
Red Hat Build of Apache Camel | =2.9.2 | |
Red Hat Build of Apache Camel | =2.9.3 | |
Red Hat Build of Apache Camel | =2.9.4 | |
Red Hat Build of Apache Camel | =2.9.5 | |
Red Hat Build of Apache Camel | =2.9.6 | |
Red Hat Build of Apache Camel | =2.9.7 | |
Red Hat Build of Apache Camel | =2.9.8 | |
Red Hat Build of Apache Camel | =2.10.0 | |
Red Hat Build of Apache Camel | =2.10.1 | |
Red Hat Build of Apache Camel | =2.10.2 | |
Red Hat Build of Apache Camel | =2.10.3 | |
Red Hat Build of Apache Camel | =2.10.4 | |
Red Hat Build of Apache Camel | =2.10.5 | |
Red Hat Build of Apache Camel | =2.10.6 | |
Red Hat Build of Apache Camel | =2.10.7 | |
Red Hat Build of Apache Camel | =2.11.0 | |
Red Hat Build of Apache Camel | =2.11.1 | |
Red Hat Build of Apache Camel | =2.11.2 | |
Red Hat Build of Apache Camel | =2.11.3 | |
Red Hat Build of Apache Camel | =2.11.4 | |
Red Hat Build of Apache Camel | =2.12.0 | |
Red Hat Build of Apache Camel | =2.12.1 | |
Red Hat Build of Apache Camel | =2.12.2 | |
Red Hat Build of Apache Camel | =2.12.3 | |
Red Hat Build of Apache Camel | =2.12.4 | |
Red Hat Build of Apache Camel | =2.12.5 | |
Red Hat Build of Apache Camel | =2.13.0 | |
Red Hat Build of Apache Camel | =2.13.1 | |
Red Hat Build of Apache Camel | =2.13.2 | |
Red Hat Build of Apache Camel | =2.13.3 | |
Red Hat Build of Apache Camel | =2.13.4 | |
Red Hat Build of Apache Camel | =2.14.0 | |
Red Hat Build of Apache Camel | =2.14.1 | |
Red Hat Build of Apache Camel | =2.14.2 | |
Red Hat Build of Apache Camel | =2.14.3 | |
Red Hat Build of Apache Camel | =2.14.4 | |
Red Hat Build of Apache Camel | =2.15.0 | |
Red Hat Build of Apache Camel | =2.15.1 | |
Red Hat Build of Apache Camel | =2.15.2 | |
Red Hat Build of Apache Camel | =2.15.3 | |
Red Hat Build of Apache Camel | =2.15.4 | |
Red Hat Build of Apache Camel | =2.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5348 is considered a critical vulnerability due to its ability to allow remote command execution using crafted serialized Java objects.
To resolve CVE-2015-5348, upgrade to Apache Camel version 2.15.5 or later, or version 2.16.1 or later.
The affected versions of Apache Camel include all 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1.
The camel-jetty and camel-servlet components are susceptible to the vulnerabilities outlined in CVE-2015-5348.
Exploitation of CVE-2015-5348 could lead to unauthorized remote command execution on the vulnerable application.