Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1569210823.4344775.1558689591923@mail.yahoo.com>
Date: Fri, 24 May 2019 09:19:51 +0000 (UTC)
From: Andrea Cosentino <ancosen1985@...oo.com>
To: Dev <dev@...el.apache.org>, Users <users@...el.apache.org>, 
	Apache Security Team <security@...che.org>, 
	"oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>, 
	JPCERT/CC <vuls@...ert.or.jp>
Subject: [SECURITY][ERRATA-CORRIGE] New security advisory CVE-2019-0188
 released for Apache Camel

A new security advisory has been released for Apache Camel, that is fixed in
the recent 2.24.0 release.

CVE-2019-0188: Apache Camel-XMLJson vulnerable to XML external entity injection (XXE) 

Severity: MEDIUM

Vendor: The Apache Software Foundation

Versions Affected: Apache Camel versions prior to 2.24.0

Description: Apache Camel provided contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed. 

Mitigation: Update to version 2.24.0

Credit: This issue was discovered by Takayoshi Isayama of Mitsui Bussan Secure Directions, Inc. 

On behalf of the Apache Camel PMC

--
Andrea Cosentino 
----------------------------------
Apache Camel PMC Chair
Apache Karaf Committer
Apache Servicemix PMC Member
Email: ancosen1985@...oo.com
Twitter: @oscerd2
Github: oscerd

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.