CVE-2014-0003 (GCVE-0-2014-0003)
Vulnerability from cvelistv5
Published
2014-03-20 19:00
Modified
2024-08-06 08:58
Severity ?
Summary
The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.
References
secalert@redhat.comhttp://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.ascExploit, Vendor Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0245.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0254.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0371.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0372.html
secalert@redhat.comhttp://secunia.com/advisories/57125Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/57716
secalert@redhat.comhttp://secunia.com/advisories/57719
secalert@redhat.comhttp://www.securityfocus.com/bid/65902
secalert@redhat.comhttps://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
secalert@redhat.comhttps://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.ascExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0245.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0254.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0371.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0372.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57125Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57716
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57719
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/65902
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:58:26.437Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "57125",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/57125",
               },
               {
                  name: "RHSA-2014:0254",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0254.html",
               },
               {
                  name: "RHSA-2014:0371",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0371.html",
               },
               {
                  name: "65902",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/65902",
               },
               {
                  name: "57719",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/57719",
               },
               {
                  name: "RHSA-2014:0245",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0245.html",
               },
               {
                  name: "57716",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/57716",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc",
               },
               {
                  name: "RHSA-2014:0372",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0372.html",
               },
               {
                  name: "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E",
               },
               {
                  name: "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-01-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-05-24T10:06:04",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "57125",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/57125",
            },
            {
               name: "RHSA-2014:0254",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0254.html",
            },
            {
               name: "RHSA-2014:0371",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0371.html",
            },
            {
               name: "65902",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/65902",
            },
            {
               name: "57719",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/57719",
            },
            {
               name: "RHSA-2014:0245",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0245.html",
            },
            {
               name: "57716",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/57716",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc",
            },
            {
               name: "RHSA-2014:0372",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0372.html",
            },
            {
               name: "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E",
            },
            {
               name: "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2014-0003",
      datePublished: "2014-03-20T19:00:00",
      dateReserved: "2013-12-03T00:00:00",
      dateUpdated: "2024-08-06T08:58:26.437Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.11.3\", \"matchCriteriaId\": \"23ED67A5-FBB0-4151-A7C4-D7F9A82D9753\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B06E9C0-DB2D-41D6-98C4-93D973929523\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1BC313E-5651-4FBB-B9E6-E66DBA0139D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83727178-A7C0-4C88-A148-E522B25A8300\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"139F899A-6652-42C2-8729-F28C63B60DBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D65D943-3954-4C65-BCFE-993ABE20136B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2ECABA1F-7D64-4272-AA2E-801C9C5CFE67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C03AED3D-FA8B-4730-B9DA-CFFCEF29A891\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3D7D5F8-89C1-4CFD-8959-E50F0AF50DD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1E1D4FA-C1D6-44E9-9326-DDFD16DE9ECF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8735662-1424-4F93-B3A3-8CB1D42F953F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:1.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"506DFDFF-1712-4B4A-814C-C8CAFB7B2EF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4EA86F9-21F1-4FB1-9412-A0BC76190C24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.0.0:milestone1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEFC3427-C311-4DC3-BFF7-0EE28706F729\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.0.0:milestone2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C4B2BB5-1535-45A3-9FB1-0B4E6D93234B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.0.0:milestone3:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BD846E7-8B3D-42D9-AA9C-26F2F9ACCE1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"735DED49-ECF3-4DFE-8BF6-D47A9BA76AC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DB96EF4-A413-4632-9D5E-8A22483E4329\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D26D7344-D86B-4BD8-97A5-F33DDCE825D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8C16CB0-F061-49FA-81FF-4698E0AB6C75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"753E5480-95BE-47D5-A020-0A7B95B41A4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02D4E217-4934-40FF-B797-2697625C4A69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E717996-F17E-4D82-8C18-D8590ECC8AB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43EC45F1-F990-4D58-90D7-86E7FE57B116\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D65BD5-BCCA-4C69-A9A4-E322AEBEE6F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6392BFDC-B18A-435D-A296-36CCF0AF6CF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86CF9343-8A2C-40AB-88EC-266CB971A7D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6386086-1DDB-4FE9-A6A3-10B3071B1A48\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8DD9514-FCDD-4BFE-A1FD-1A44E07671FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8899BFF7-4077-46D4-BC20-B8FC31D76BA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C90E281-33F1-4010-A5A4-CB551C2B59C6\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.\"}, {\"lang\": \"es\", \"value\": \"El componente XSLT en Apache Camel 2.11.x anterior a 2.11.4, 2.12.x anterior a 2.12.3 y posiblemente versiones anteriores permite a atacantes remotos ejecutar m\\u00e9todos Java arbitrarios a trav\\u00e9s de un mensaje manipulado.\"}]",
         id: "CVE-2014-0003",
         lastModified: "2024-11-21T02:01:09.127",
         metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
         published: "2014-03-21T04:38:59.057",
         references: "[{\"url\": \"http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0245.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0254.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0371.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0372.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/57125\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/57716\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/57719\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/65902\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0245.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0254.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0371.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0372.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/57125\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/57716\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/57719\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/65902\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
         sourceIdentifier: "secalert@redhat.com",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2014-0003\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-03-21T04:38:59.057\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.\"},{\"lang\":\"es\",\"value\":\"El componente XSLT en Apache Camel 2.11.x anterior a 2.11.4, 2.12.x anterior a 2.12.3 y posiblemente versiones anteriores permite a atacantes remotos ejecutar métodos Java arbitrarios a través de un mensaje manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.11.3\",\"matchCriteriaId\":\"23ED67A5-FBB0-4151-A7C4-D7F9A82D9753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B06E9C0-DB2D-41D6-98C4-93D973929523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1BC313E-5651-4FBB-B9E6-E66DBA0139D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83727178-A7C0-4C88-A148-E522B25A8300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139F899A-6652-42C2-8729-F28C63B60DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D65D943-3954-4C65-BCFE-993ABE20136B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ECABA1F-7D64-4272-AA2E-801C9C5CFE67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C03AED3D-FA8B-4730-B9DA-CFFCEF29A891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3D7D5F8-89C1-4CFD-8959-E50F0AF50DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1E1D4FA-C1D6-44E9-9326-DDFD16DE9ECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8735662-1424-4F93-B3A3-8CB1D42F953F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"506DFDFF-1712-4B4A-814C-C8CAFB7B2EF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4EA86F9-21F1-4FB1-9412-A0BC76190C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.0.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEFC3427-C311-4DC3-BFF7-0EE28706F729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4B2BB5-1535-45A3-9FB1-0B4E6D93234B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.0.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD846E7-8B3D-42D9-AA9C-26F2F9ACCE1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"735DED49-ECF3-4DFE-8BF6-D47A9BA76AC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB96EF4-A413-4632-9D5E-8A22483E4329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26D7344-D86B-4BD8-97A5-F33DDCE825D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C16CB0-F061-49FA-81FF-4698E0AB6C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"753E5480-95BE-47D5-A020-0A7B95B41A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D4E217-4934-40FF-B797-2697625C4A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E717996-F17E-4D82-8C18-D8590ECC8AB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43EC45F1-F990-4D58-90D7-86E7FE57B116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D65BD5-BCCA-4C69-A9A4-E322AEBEE6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6392BFDC-B18A-435D-A296-36CCF0AF6CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86CF9343-8A2C-40AB-88EC-266CB971A7D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6386086-1DDB-4FE9-A6A3-10B3071B1A48\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DD9514-FCDD-4BFE-A1FD-1A44E07671FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8899BFF7-4077-46D4-BC20-B8FC31D76BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C90E281-33F1-4010-A5A4-CB551C2B59C6\"}]}]}],\"references\":[{\"url\":\"http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0245.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0254.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0371.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0372.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57125\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57716\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57719\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/65902\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0245.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0254.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0371.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0372.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57125\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/57716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/65902\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.