![]() |
|
Message-ID: <edd3eb84-976d-20c7-4e32-760569b4b7d3@apache.org> Date: Tue, 01 Apr 2025 10:15:19 +0000 From: Andrea Cosentino <acosentino@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-30177: Apache Camel: Camel-Undertow Message Header Injection via Improper Filtering Severity: moderate Affected versions: - Apache Camel 4.10.0 before 4.10.3 - Apache Camel 4.8.0 before 4.8.6 Description: Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions. This issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6. Users are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS. Camel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the "out" direction, while it doesn't filter the "in" direction. This allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component. This issue is being tracked as CAMEL-21876 Credit: Mark Thorson of AT&T (finder) Mark Thorson of AT&T (reporter) References: https://camel.apache.org/security/CVE-2025-27636.html https://camel.apache.org/security/CVE-2025-29891.html https://camel.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-30177 https://issues.apache.org/jira/browse/CAMEL-21876
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.