First published: Mon Feb 26 2024(Updated: )
Exposure of sensitive data by by crafting a malicious EventFactory and providing a custom ExchangeCreatedEvent that exposes sensitive data. Vulnerability in Apache Camel.This issue affects Apache Camel: from 3.21.X through 3.21.3, from 3.22.X through 3.22.0, from 4.0.X through 4.0.3, from 4.X through 4.3.0. Users are recommended to upgrade to version 3.21.4, 3.22.1, 4.0.4 or 4.4.0, which fixes the issue. References: <a href="https://camel.apache.org/security/CVE-2024-22371.html">https://camel.apache.org/security/CVE-2024-22371.html</a> <a href="https://camel.apache.org/">https://camel.apache.org/</a> <a href="https://www.cve.org/CVERecord?id=CVE-2024-22371">https://www.cve.org/CVERecord?id=CVE-2024-22371</a> <a href="https://issues.apache.org/jira/browse/CAMEL-20305">https://issues.apache.org/jira/browse/CAMEL-20305</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Camel | >=3.21.0>=3.22.0>=4.0.0>=4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2266024 is categorized as high due to the exposure of sensitive data.
To fix REDHAT-BUG-2266024, update Apache Camel to the latest version that addresses the vulnerability.
Versions of Apache Camel from 3.21.0 to 3.21.3, from 3.22.0, and from 4.0.0 to 4.0.3 are affected by REDHAT-BUG-2266024.
The nature of the vulnerability in REDHAT-BUG-2266024 involves the exposure of sensitive data through a crafted EventFactory.
Yes, there are known exploit scenarios for REDHAT-BUG-2266024 that involve malicious EventFactory implementations leading to data leakage.