This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-website.git
The following commit(s) were added to refs/heads/main by this push: new c63521d8 Update the severity of CVE-2025-27636 to Medium instead of moderate c63521d8 is described below commit c63521d8c1459f6de4d97127f6da9395c85a25ac Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Tue Apr 1 18:25:41 2025 +0200 Update the severity of CVE-2025-27636 to Medium instead of moderate Signed-off-by: Andrea Cosentino <anco...@gmail.com> --- content/security/CVE-2025-27636.md | 2 +- content/security/CVE-2025-27636.txt.asc | 18 +++++++++--------- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/content/security/CVE-2025-27636.md b/content/security/CVE-2025-27636.md index 64146587..c561508b 100644 --- a/content/security/CVE-2025-27636.md +++ b/content/security/CVE-2025-27636.md @@ -5,7 +5,7 @@ url: /security/CVE-2025-27636.html draft: false type: security-advisory cve: CVE-2025-27636 -severity: MODERATE +severity: MEDIUM summary: "Camel Message Header Injection via Improper Filtering" description: "This vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components: camel-servlet, camel-jetty, camel-undertow, camel-platform-http and camel-netty-http and in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular: The bean invocation (is only affected if you use any of the above together with camel-bean component) [...] headers that for some Camel components can alter the behaviours such as the camel-bean component, to call another method diff --git a/content/security/CVE-2025-27636.txt.asc b/content/security/CVE-2025-27636.txt.asc index 488a20aa..0b652cec 100644 --- a/content/security/CVE-2025-27636.txt.asc +++ b/content/security/CVE-2025-27636.txt.asc @@ -8,7 +8,7 @@ url: /security/CVE-2025-27636.html draft: false type: security-advisory cve: CVE-2025-27636 -severity: MODERATE +severity: MEDIUM summary: "Camel Message Header Injection via Improper Filtering" description: "This vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components: camel-servlet, camel-jetty, camel-undertow, camel-platform-http and camel-netty-http and in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular: The bean invocation (is only affected if you use any of the above together with camel-bean component) [...] headers that for some Camel components can alter the behaviours such as the camel-bean component, to call another method @@ -56,12 +56,12 @@ fixed: 3.22.4, 4.8.5 and 4.10.2 The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-21828 refers to the various commits that resolved the issue, and have more details. -----BEGIN PGP SIGNATURE----- -iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfSlIEACgkQ406fOAL/ -QQCJ5ggApUZBHWtrwEKRBR02ni+Xm5h7aOOXnQIVzGyXwPBB1ZI0J5VOOIyePE64 -PC69UbGzqBxkYbURGqAiBJqfdpaISDkDD9zKWugIZG1DNtwg1VxqMA6/KJKQYt1g -AzKf1m1b9guCwuFQjqIh04bMXrKhu9bOPGqjuE9SwHK8SPQgYI1tkWEZjKjfyAlc -xZBZRP+VKpxOKwKOwHmVHSWZ0in8YshevmKw48p7g1BN7ACcA/rY9gYzJ7YRhkkb -RHzXIPEQ3PFWG6HAXYuSqUy+hi7hfVKdBWrdqW6+OTqcHtgR4ZPZmO7ZEoKUKxQE -8ryHjb5SRVw3BaS6nvvPEGzRhQbFRQ== -=X5cK +iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfsE2wACgkQ406fOAL/ +QQCzswf6A7sqnQYh83jNeV2VcfrrcIq9hsvmw6CTYfbmD7zg/jAPtDPhI/pbH5Eo +eQSlIzf2WynI7YC4nNaPNUVlFCHGEcVeoPnkQyGltibVzCrx+RJVb+VYse2nw9vD +iil1/TLYeBMEwKpHOWszYxg+tGwKfMM9ixSDlNv9B72psAT/FuXd6nAvu2AeZPxv +2uKsEg2kz1kZWJ4PNYPobu0xr4XueEA3yoQsJUKDxqyS6WnmuwE60XC+SucOXvwv +8XT4q7MPlzgrw0Vzxi2Kv0q6viXTt4/UEIJntyxlHUUh/5BjL+Dgnqdf2xx+8MrP +XYYNdsJhB4lGao36FO+WJt5DJP20AA== +=ux8V -----END PGP SIGNATURE-----