Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <edd3eb84-976d-20c7-4e32-760569b4b7d3@apache.org>
Date: Tue, 01 Apr 2025 10:15:19 +0000
From: Andrea Cosentino <acosentino@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-30177: Apache Camel: Camel-Undertow Message Header
 Injection via Improper Filtering 

Severity: moderate

Affected versions:

- Apache Camel 4.10.0 before 4.10.3
- Apache Camel 4.8.0 before 4.8.6

Description:

Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.

This issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.

Users are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.

Camel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the "out" direction, while it doesn't filter the "in" direction.


This allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component.

This issue is being tracked as CAMEL-21876 

Credit:

Mark Thorson of AT&T (finder)
Mark Thorson of AT&T (reporter)

References:

https://camel.apache.org/security/CVE-2025-27636.html
https://camel.apache.org/security/CVE-2025-29891.html
https://camel.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-30177
https://issues.apache.org/jira/browse/CAMEL-21876

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.