This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-website.git


The following commit(s) were added to refs/heads/main by this push:
     new cb0a96de Updated the CVE-2025-27636
cb0a96de is described below

commit cb0a96de9219c9a9c10618a18a61151dc93caa51
Author: Andrea Cosentino <anco...@gmail.com>
AuthorDate: Sun Mar 9 14:44:50 2025 +0100

    Updated the CVE-2025-27636
    
    Signed-off-by: Andrea Cosentino <anco...@gmail.com>
---
 content/security/CVE-2025-27636.md      |  6 +++---
 content/security/CVE-2025-27636.txt.asc | 22 +++++++++++-----------
 2 files changed, 14 insertions(+), 14 deletions(-)

diff --git a/content/security/CVE-2025-27636.md 
b/content/security/CVE-2025-27636.md
index 3c8e79c4..85712858 100644
--- a/content/security/CVE-2025-27636.md
+++ b/content/security/CVE-2025-27636.md
@@ -6,9 +6,9 @@ draft: false
 type: security-advisory
 cve: CVE-2025-27636
 severity: MODERATE
-summary: "Apache Camel: Camel Message Header Injection via Improper Filtering"
-description: "The default header filter strategy in Camel could be bypassed by 
altering the casing of letters. The default filtering mechanism that only 
blocks headers starting with 'Camel', 'camel', or 'org.apache.camel.'. This 
allows attackers to inject headers which can be exploited to invoke arbitrary 
methods from the Bean registry and also supports using Simple Expression 
Language (or OGNL in some cases) as part of the method parameters passed to the 
bean. It's important to note tha [...]
-mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x 
LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases."
+summary: "Apache Camel-Bean component: Camel Message Header Injection via 
Improper Filtering"
+description: "This vulnerability is only present in the following situation. 
The user is using one of the following HTTP Servers via one the of the 
following Camel components: camel-servlet, camel-jetty, camel-undertow, 
camel-platform-http and camel-netty-http and in the route, the exchange will be 
routed to a camel-bean producer. So ONLY camel-bean component is affected. In 
particular: The bean invocation (is only affected if you use any of the above 
together with camel-bean component)  [...]
+mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x 
LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. Also, users could use 
removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in 
general everything not starting with 'Camel', 'camel' or 'org.apache.camel.'. "
 credit: "This issue was discovered by Mark Thorson of AT&T"
 affected: Apache Camel 4.10.0 before 4.10.2. Apache Camel 4.8.0 before 4.8.5. 
Apache Camel 3.10.0 before 3.22.4.
 fixed: 3.22.4, 4.8.5 and 4.10.2 
diff --git a/content/security/CVE-2025-27636.txt.asc 
b/content/security/CVE-2025-27636.txt.asc
index 67b4701a..f812d8fd 100644
--- a/content/security/CVE-2025-27636.txt.asc
+++ b/content/security/CVE-2025-27636.txt.asc
@@ -9,9 +9,9 @@ draft: false
 type: security-advisory
 cve: CVE-2025-27636
 severity: MODERATE
-summary: "Apache Camel: Camel Message Header Injection via Improper Filtering"
-description: "The default header filter strategy in Camel could be bypassed by 
altering the casing of letters. The default filtering mechanism that only 
blocks headers starting with 'Camel', 'camel', or 'org.apache.camel.'. This 
allows attackers to inject headers which can be exploited to invoke arbitrary 
methods from the Bean registry and also supports using Simple Expression 
Language (or OGNL in some cases) as part of the method parameters passed to the 
bean. It's important to note tha [...]
-mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x 
LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases."
+summary: "Apache Camel-Bean component: Camel Message Header Injection via 
Improper Filtering"
+description: "This vulnerability is only present in the following situation. 
The user is using one of the following HTTP Servers via one the of the 
following Camel components: camel-servlet, camel-jetty, camel-undertow, 
camel-platform-http and camel-netty-http and in the route, the exchange will be 
routed to a camel-bean producer. So ONLY camel-bean component is affected. In 
particular: The bean invocation (is only affected if you use any of the above 
together with camel-bean component)  [...]
+mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x 
LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. Also, users could use 
removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in 
general everything not starting with 'Camel', 'camel' or 'org.apache.camel.'. "
 credit: "This issue was discovered by Mark Thorson of AT&T"
 affected: Apache Camel 4.10.0 before 4.10.2. Apache Camel 4.8.0 before 4.8.5. 
Apache Camel 3.10.0 before 3.22.4.
 fixed: 3.22.4, 4.8.5 and 4.10.2 
@@ -20,12 +20,12 @@ fixed: 3.22.4, 4.8.5 and 4.10.2
 The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-21828 refers to 
the various commits that resolved the issue, and have more details.
 -----BEGIN PGP SIGNATURE-----
 
-iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfNc5IACgkQ406fOAL/
-QQBf3Qf7BIb5J4mT85gZHlcYtqGkUnS9BLJSAI2odYCy9M9bvskA9vIqVHLDPXrM
-YBKDaesnzGbdc9HFwJ9WLxKjwVjLfUL6UH02eSGrg2gHMKgMTvmumjLcHsYZIodl
-7ALbTjsU+RkdluDd9RUJylDGp8T7dFXPDs78adYNO5b+APdPk/jz1LpUQ1nCSzwV
-oOiiABPTJwK4qrPaWWApatbLYQulHsfWqXJ8guaeb/IbqV0u7jDD08/F5E1ph8AF
-zrrn4t4GLyU6OJUeiECy/ZP1w5MWzipt9cMPQn97oPbjJH4CGpQCS8pO6bMj5JXf
-/LITN6o6RMqDxSszdmF0UVfHbiCo8w==
-=KuUE
+iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfNmz4ACgkQ406fOAL/
+QQDSyAf/RwNXqO/BjFAXQazhSAXU71/XUBLw+8eL4epas1iluOtEuYDbnKwM2E/1
+ORgQ3noWI8geNE1FPHij0chuDxNyv5N4dYKwTfOXbjDVMBgQj3cQxxjiZxqW7lA5
+ddLoBPcmS8F/UCMhP/HxHQitnTfi2zzcAZrZNZVLVSPUkMcHGMIOc5l6WLkVF1VE
+ehHp+UPupNryG+6/By2SoQGliE2U9pCja/UWSKJie5MzBblsQYaG0CE3n+4WuraU
+ZUQ60r3hOITn2SKnZw+aNrA2JyxgjHrIuG+HdMTBx5TKDCkhoX4ge4to3y7nZ/jo
+dkmW1ESK9gSkpYhlxPdXRdc4m3kVWg==
+=bIz5
 -----END PGP SIGNATURE-----

Reply via email to