First published: Wed May 03 2023(Updated: )
This release of Camel for Spring Boot 3.20.1 serves as a replacement for Camel for Spring Boot 3.18.3 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.<br>The purpose of this text-only errata is to inform you about the security issues fixed.<br>Security Fix(es):<br><li> snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)</li> <li> JXPath: untrusted XPath expressions may lead to RCE attack (CVE-2022-41852)</li> <li> hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)</li> <li> xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow (CVE-2022-41966)</li> <li> springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860)</li> <li> apache-commons-net: FTP client trusts the host from PASV response by default (CVE-2021-37533)</li> <li> undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)</li> <li> apache-spark: XSS vulnerability in log viewer UI Javascript (CVE-2022-31777)</li> <li> Apache Pulsar: Improper Hostname Verification in Java Client and Proxy can expose authentication data via MITM (CVE-2022-33681)</li> <li> apache-ivy: Directory Traversal (CVE-2022-37865)</li> <li> : Apache Ivy: Ivy Path traversal (CVE-2022-37866)</li> <li> batik: Server-Side Request Forgery (CVE-2022-38398)</li> <li> batik: Server-Side Request Forgery (CVE-2022-38648)</li> <li> snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749)</li> <li> snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750)</li> <li> snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751)</li> <li> snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)</li> <li> scandium: Failing DTLS handshakes may cause throttling to block processing of records (CVE-2022-39368)</li> <li> batik: Server-Side Request Forgery (SSRF) vulnerability (CVE-2022-40146)</li> <li> xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40151)</li> <li> woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152)</li> <li> xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40156)</li> <li> batik: Apache XML Graphics Batik vulnerable to code execution via SVG (CVE-2022-41704)</li> <li> dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)</li> <li> codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)</li> <li> jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)</li> <li> jackson-databind: use of deeply nested arrays (CVE-2022-42004)</li> <li> batik: Untrusted code execution in Apache XML Graphics Batik (CVE-2022-42890)</li> <li> jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436)</li> <li> springframework: Spring Expression DoS Vulnerability (CVE-2023-20861)</li> <li> shiro: Authentication bypass through a specially crafted HTTP request (CVE-2023-22602)</li> <li> Apache Commons FileUpload: FileUpload DoS with excessive parts (CVE-2023-24998)</li> <li> jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)</li> <li> springframework: Spring Expression DoS Vulnerability (CVE-2023-20863)</li> <li> json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) (CVE-2023-1370)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.