First published: Fri Mar 07 2025(Updated: )
Affected Component: Apache Camel Framework (specifically versions 3.x through 4.10.1) Vuln Type: Bypass/Injection The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with "Camel", "camel", or Attackers can bypass this filter by altering the casing of any letter other than the first one (e.g., "GAme\" or "GAW"). This allows attackers to inject headers like GAmelMeth0dßeanName, which can be exploited to invoke arbitrary methods from the Bean registry@04 and also supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean (see attached examples). There are quite a large number of other "Camel" headers that, if manipulated, could allow an attacker to do some pretty dangerous things (think CamelSqlQuery).
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Camel | >=3.0.0<4.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2350682 is considered high due to its potential to allow bypass and injection attacks.
To fix REDHAT-BUG-2350682, update the Apache Camel Framework to the latest version beyond 4.10.1.
Versions of the Apache Camel Framework from 3.0.0 up to and including 4.10.1 are affected by REDHAT-BUG-2350682.
REDHAT-BUG-2350682 is classified as a bypass/injection vulnerability.
The impacted component of REDHAT-BUG-2350682 is the Apache Camel Framework.