This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-website.git
The following commit(s) were added to refs/heads/main by this push: new cb0a96de Updated the CVE-2025-27636 cb0a96de is described below commit cb0a96de9219c9a9c10618a18a61151dc93caa51 Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Sun Mar 9 14:44:50 2025 +0100 Updated the CVE-2025-27636 Signed-off-by: Andrea Cosentino <anco...@gmail.com> --- content/security/CVE-2025-27636.md | 6 +++--- content/security/CVE-2025-27636.txt.asc | 22 +++++++++++----------- 2 files changed, 14 insertions(+), 14 deletions(-) diff --git a/content/security/CVE-2025-27636.md b/content/security/CVE-2025-27636.md index 3c8e79c4..85712858 100644 --- a/content/security/CVE-2025-27636.md +++ b/content/security/CVE-2025-27636.md @@ -6,9 +6,9 @@ draft: false type: security-advisory cve: CVE-2025-27636 severity: MODERATE -summary: "Apache Camel: Camel Message Header Injection via Improper Filtering" -description: "The default header filter strategy in Camel could be bypassed by altering the casing of letters. The default filtering mechanism that only blocks headers starting with 'Camel', 'camel', or 'org.apache.camel.'. This allows attackers to inject headers which can be exploited to invoke arbitrary methods from the Bean registry and also supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean. It's important to note tha [...] -mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases." +summary: "Apache Camel-Bean component: Camel Message Header Injection via Improper Filtering" +description: "This vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components: camel-servlet, camel-jetty, camel-undertow, camel-platform-http and camel-netty-http and in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular: The bean invocation (is only affected if you use any of the above together with camel-bean component) [...] +mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. Also, users could use removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with 'Camel', 'camel' or 'org.apache.camel.'. " credit: "This issue was discovered by Mark Thorson of AT&T" affected: Apache Camel 4.10.0 before 4.10.2. Apache Camel 4.8.0 before 4.8.5. Apache Camel 3.10.0 before 3.22.4. fixed: 3.22.4, 4.8.5 and 4.10.2 diff --git a/content/security/CVE-2025-27636.txt.asc b/content/security/CVE-2025-27636.txt.asc index 67b4701a..f812d8fd 100644 --- a/content/security/CVE-2025-27636.txt.asc +++ b/content/security/CVE-2025-27636.txt.asc @@ -9,9 +9,9 @@ draft: false type: security-advisory cve: CVE-2025-27636 severity: MODERATE -summary: "Apache Camel: Camel Message Header Injection via Improper Filtering" -description: "The default header filter strategy in Camel could be bypassed by altering the casing of letters. The default filtering mechanism that only blocks headers starting with 'Camel', 'camel', or 'org.apache.camel.'. This allows attackers to inject headers which can be exploited to invoke arbitrary methods from the Bean registry and also supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean. It's important to note tha [...] -mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases." +summary: "Apache Camel-Bean component: Camel Message Header Injection via Improper Filtering" +description: "This vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components: camel-servlet, camel-jetty, camel-undertow, camel-platform-http and camel-netty-http and in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular: The bean invocation (is only affected if you use any of the above together with camel-bean component) [...] +mitigation: "Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. Also, users could use removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with 'Camel', 'camel' or 'org.apache.camel.'. " credit: "This issue was discovered by Mark Thorson of AT&T" affected: Apache Camel 4.10.0 before 4.10.2. Apache Camel 4.8.0 before 4.8.5. Apache Camel 3.10.0 before 3.22.4. fixed: 3.22.4, 4.8.5 and 4.10.2 @@ -20,12 +20,12 @@ fixed: 3.22.4, 4.8.5 and 4.10.2 The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-21828 refers to the various commits that resolved the issue, and have more details. -----BEGIN PGP SIGNATURE----- -iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfNc5IACgkQ406fOAL/ -QQBf3Qf7BIb5J4mT85gZHlcYtqGkUnS9BLJSAI2odYCy9M9bvskA9vIqVHLDPXrM -YBKDaesnzGbdc9HFwJ9WLxKjwVjLfUL6UH02eSGrg2gHMKgMTvmumjLcHsYZIodl -7ALbTjsU+RkdluDd9RUJylDGp8T7dFXPDs78adYNO5b+APdPk/jz1LpUQ1nCSzwV -oOiiABPTJwK4qrPaWWApatbLYQulHsfWqXJ8guaeb/IbqV0u7jDD08/F5E1ph8AF -zrrn4t4GLyU6OJUeiECy/ZP1w5MWzipt9cMPQn97oPbjJH4CGpQCS8pO6bMj5JXf -/LITN6o6RMqDxSszdmF0UVfHbiCo8w== -=KuUE +iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfNmz4ACgkQ406fOAL/ +QQDSyAf/RwNXqO/BjFAXQazhSAXU71/XUBLw+8eL4epas1iluOtEuYDbnKwM2E/1 +ORgQ3noWI8geNE1FPHij0chuDxNyv5N4dYKwTfOXbjDVMBgQj3cQxxjiZxqW7lA5 +ddLoBPcmS8F/UCMhP/HxHQitnTfi2zzcAZrZNZVLVSPUkMcHGMIOc5l6WLkVF1VE +ehHp+UPupNryG+6/By2SoQGliE2U9pCja/UWSKJie5MzBblsQYaG0CE3n+4WuraU +ZUQ60r3hOITn2SKnZw+aNrA2JyxgjHrIuG+HdMTBx5TKDCkhoX4ge4to3y7nZ/jo +dkmW1ESK9gSkpYhlxPdXRdc4m3kVWg== +=bIz5 -----END PGP SIGNATURE-----