First published: Thu Mar 16 2017(Updated: )
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.camel:camel-core | >=2.18.0<2.18.2 | 2.18.2 |
maven/org.apache.camel:camel-core | <2.17.6 | 2.17.6 |
redhat/camel-core | <2.17.6 | 2.17.6 |
redhat/camel-core | <2.18.3 | 2.18.3 |
Red Hat Build of Apache Camel | <=2.16.0 | |
Red Hat Build of Apache Camel | =2.17.0 | |
Red Hat Build of Apache Camel | =2.17.1 | |
Red Hat Build of Apache Camel | =2.17.2 | |
Red Hat Build of Apache Camel | =2.17.3 | |
Red Hat Build of Apache Camel | =2.17.4 | |
Red Hat Build of Apache Camel | =2.17.5 | |
Red Hat Build of Apache Camel | =2.18.0 | |
Red Hat Build of Apache Camel | =2.18.1 | |
Red Hat Build of Apache Camel | =2.18.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5643 has a moderate severity level due to its potential exploitation via Server-Side Request Forgery (SSRF) using remote DTDs and XML External Entity (XXE).
To fix CVE-2017-5643, upgrade Apache Camel to version 2.18.2 or 2.17.6 or later.
CVE-2017-5643 affects various versions of Apache Camel, specifically versions prior to 2.17.6 and 2.18.2.
CVE-2017-5643 allows attackers to exploit SSRF vulnerabilities through remote DTDs and perform XXE attacks.
Yes, upgrading to Apache Camel version 2.18.2 or 2.17.6 or their later versions mitigates the risk associated with CVE-2017-5643.