First published: Wed Jan 08 2014(Updated: )
It was found that the Apache Camel XSLT component would resolve entities in XML messages when transforming them using an xslt: route. A remote attacker able to submit messages to an xslt: Camel route could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Apache Camel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1049675 is high due to potential information disclosure risks.
To fix REDHAT-BUG-1049675, update to the latest version of the Apache Camel that addresses this vulnerability.
REDHAT-BUG-1049675 affects the Apache Camel XSLT component used in XML message processing.
REDHAT-BUG-1049675 does not directly lead to remote code execution but allows unauthorized file access.
Any users running the Red Hat Build of Apache Camel with the XSLT component enabled are affected by REDHAT-BUG-1049675.