First published: Mon Feb 19 2024(Updated: )
Deserialization of Untrusted Data vulnerability in Apache Camel CassandraQL Component AggregationRepository which is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload.This issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0. Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.camel:camel-cassandraql | >=4.1.0<4.4.0 | 4.4.0 |
maven/org.apache.camel:camel-cassandraql | >=4.0.0<4.0.4 | 4.0.4 |
maven/org.apache.camel:camel-cassandraql | >=3.22.0<3.22.1 | 3.22.1 |
maven/org.apache.camel:camel-cassandraql | >=3.0.0<3.21.4 | 3.21.4 |
redhat/Apache Camel | <3.21.4 | 3.21.4 |
redhat/Apache Camel | <3.22.1 | 3.22.1 |
redhat/Apache Camel | <4.0.4 | 4.0.4 |
redhat/Apache Camel | <4.4.0 | 4.4.0 |
Red Hat Build of Apache Camel | >=3.0.0<3.21.4 | |
Red Hat Build of Apache Camel | >=4.0.0<4.0.4 | |
Red Hat Build of Apache Camel | >=4.1.0<4.4.0 | |
Red Hat Build of Apache Camel | =3.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23114 is classified as a high severity vulnerability due to the risk of unsafe deserialization of untrusted data.
To fix CVE-2024-23114, upgrade to Apache Camel versions 3.21.4, 3.22.1, 4.0.4, or 4.4.0.
Apache Camel versions from 3.0.0 up to but not including 3.21.4, and 4.0.0 up to but not including 4.4.0 are affected by CVE-2024-23114.
CVE-2024-23114 specifically impacts the CassandraQL component in Apache Camel's AggregationRepository.
Yes, CVE-2024-23114 poses a critical security risk if your application processes untrusted data without proper validation.