cve-2015-5348
Vulnerability from cvelistv5
Published
2016-04-15 15:00
Modified
2024-08-06 06:41
Severity ?
Summary
Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:41:09.342Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html"
          },
          {
            "name": "RHSA-2016:2035",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.apache.org/jira/browse/CAMEL-9309"
          },
          {
            "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded"
          },
          {
            "name": "80696",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/80696"
          },
          {
            "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"
          },
          {
            "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-24T10:06:03",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html"
        },
        {
          "name": "RHSA-2016:2035",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.apache.org/jira/browse/CAMEL-9309"
        },
        {
          "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded"
        },
        {
          "name": "80696",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/80696"
        },
        {
          "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"
        },
        {
          "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2015-5348",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html"
            },
            {
              "name": "RHSA-2016:2035",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
            },
            {
              "name": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc",
              "refsource": "CONFIRM",
              "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc"
            },
            {
              "name": "https://issues.apache.org/jira/browse/CAMEL-9309",
              "refsource": "CONFIRM",
              "url": "https://issues.apache.org/jira/browse/CAMEL-9309"
            },
            {
              "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded"
            },
            {
              "name": "80696",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/80696"
            },
            {
              "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"
            },
            {
              "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2015-5348",
    "datePublished": "2016-04-15T15:00:00",
    "dateReserved": "2015-07-01T00:00:00",
    "dateUpdated": "2024-08-06T06:41:09.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-5348\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-04-15T15:59:00.110\",\"lastModified\":\"2023-11-07T02:26:09.657\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.\"},{\"lang\":\"es\",\"value\":\"Apache Camel 2.6.x hasta la versi\u00f3n 2.14.x, 2.15.x en versiones anteriores a 2.15.5 y 2.16.x en versiones anteriores a 2.16.1, cuando se utiliza(1) camel-jetty o (2) camel-servlet como un consumidor en rutas Camel, permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un objeto Java serializado manipulado en una petici\u00f3n HTTP.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7F8143-7907-404B-8450-29B8D0993BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923393A5-5B57-426E-96FD-08F47A18CC68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B5D10E-A4A0-42AB-B6A1-7B4B433B75BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE84D0D4-105F-4CD0-91ED-449508386AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E701F1-5E53-44F1-8781-D37351A319F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE63834-D84A-45C0-96CB-4EC4258E1C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A6411F-679F-4B6C-9370-6D4D97C05256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D435FE-6266-4F3D-A17B-8611E005332C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89CE83EA-1DFC-4739-A8CB-2F514664D4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA7F756F-3D1B-477B-B0D5-F3916EC8705E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D02F8D5-84BA-49C5-89BB-FD8E81AFEA90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234661BC-ADFD-4580-A07B-B79BA620EB6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"731A1E0D-04E8-47DA-AFF1-25DCBEA458C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E8229D-2B40-4808-9B7C-867ABCE9F4EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D0B86A-7190-494B-B696-694FDB6B7736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE36D07F-3AA8-4B4E-872D-183D855734D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29694A50-A07C-4E64-B65A-B8DC0C402B60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"265735B4-6869-4C60-9F90-524B228EC0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D195962F-2BD9-47E0-AB21-05581FF9FDAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42B5BD9F-0CDD-4330-8B70-87EFEE5933B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"418FB30A-3172-469E-8539-2B8DA28F5BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F80FB4-28B0-42BA-B4B8-4A70C2D3445D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB5262A-23DD-4F62-8430-914E30B41A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB96EF4-A413-4632-9D5E-8A22483E4329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26D7344-D86B-4BD8-97A5-F33DDCE825D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C16CB0-F061-49FA-81FF-4698E0AB6C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"753E5480-95BE-47D5-A020-0A7B95B41A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D4E217-4934-40FF-B797-2697625C4A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E717996-F17E-4D82-8C18-D8590ECC8AB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43EC45F1-F990-4D58-90D7-86E7FE57B116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D65BD5-BCCA-4C69-A9A4-E322AEBEE6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6392BFDC-B18A-435D-A296-36CCF0AF6CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86CF9343-8A2C-40AB-88EC-266CB971A7D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6386086-1DDB-4FE9-A6A3-10B3071B1A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E524D607-DE24-4E1C-9DA3-761367BE5CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9167551C-9C57-4DB4-AE7A-623A800456C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DD9514-FCDD-4BFE-A1FD-1A44E07671FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8899BFF7-4077-46D4-BC20-B8FC31D76BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C90E281-33F1-4010-A5A4-CB551C2B59C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491A4C7C-DF73-4159-9D6F-5884163C5A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B45050F1-B4AD-45E5-A3BB-4CA138224354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F6F8A5-6735-4FB9-81A5-F7EB5D8F2552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860DA6E4-9E95-47AB-94C5-B9E8DBB90048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29E1B268-981F-4B85-89E5-F46B05EDCBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDF45D73-2BAE-489F-AAE7-9382DBF4BF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D46F044-9B22-4C21-9EC1-33B0D3C9BBEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A124B239-5ADB-459F-90EF-308C09D6B87F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8F319C-1212-4787-A1E8-15D576527EF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17E12D85-196F-4723-A4EC-7DC900087AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D70BC2-A8C7-4BA3-B976-B9B48283BEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABE8371-E4FD-4A10-A2C0-64952F25430D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D4CA0D-872F-4627-A634-95ADB76C3F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538D4C75-2DAB-434A-91F4-C28187878862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E4EB84-AC3D-4390-9C8F-E6D0CACB1B8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4101AE-6D14-4982-8F7F-1BFE9003C99F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D48151F-554D-49FE-97DD-3FD1FFDDAA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB7532A-1C2F-4F47-9550-A5019B7382AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2823D06C-99B3-4959-9821-CC5A850E11C5\"}]}]}],\"references\":[{\"url\":\"http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2035.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/537147/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/80696\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.apache.org/jira/browse/CAMEL-9309\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.