cve-2015-5348
Vulnerability from cvelistv5
Published
2016-04-15 15:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "RHSA-2016:2035", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "80696", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/80696" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-24T10:06:03", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "RHSA-2016:2035", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "80696", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/80696" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "RHSA-2016:2035", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "name": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc", "refsource": "CONFIRM", "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "name": "https://issues.apache.org/jira/browse/CAMEL-9309", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "80696", "refsource": "BID", "url": "http://www.securityfocus.com/bid/80696" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5348", "datePublished": "2016-04-15T15:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-5348\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-04-15T15:59:00.110\",\"lastModified\":\"2023-11-07T02:26:09.657\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.\"},{\"lang\":\"es\",\"value\":\"Apache Camel 2.6.x hasta la versi\u00f3n 2.14.x, 2.15.x en versiones anteriores a 2.15.5 y 2.16.x en versiones anteriores a 2.16.1, cuando se utiliza(1) camel-jetty o (2) camel-servlet como un consumidor en rutas Camel, permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un objeto Java serializado manipulado en una petici\u00f3n HTTP.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7F8143-7907-404B-8450-29B8D0993BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923393A5-5B57-426E-96FD-08F47A18CC68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B5D10E-A4A0-42AB-B6A1-7B4B433B75BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE84D0D4-105F-4CD0-91ED-449508386AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E701F1-5E53-44F1-8781-D37351A319F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE63834-D84A-45C0-96CB-4EC4258E1C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A6411F-679F-4B6C-9370-6D4D97C05256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D435FE-6266-4F3D-A17B-8611E005332C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89CE83EA-1DFC-4739-A8CB-2F514664D4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA7F756F-3D1B-477B-B0D5-F3916EC8705E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D02F8D5-84BA-49C5-89BB-FD8E81AFEA90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234661BC-ADFD-4580-A07B-B79BA620EB6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"731A1E0D-04E8-47DA-AFF1-25DCBEA458C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E8229D-2B40-4808-9B7C-867ABCE9F4EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D0B86A-7190-494B-B696-694FDB6B7736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE36D07F-3AA8-4B4E-872D-183D855734D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29694A50-A07C-4E64-B65A-B8DC0C402B60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"265735B4-6869-4C60-9F90-524B228EC0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D195962F-2BD9-47E0-AB21-05581FF9FDAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42B5BD9F-0CDD-4330-8B70-87EFEE5933B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"418FB30A-3172-469E-8539-2B8DA28F5BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F80FB4-28B0-42BA-B4B8-4A70C2D3445D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB5262A-23DD-4F62-8430-914E30B41A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB96EF4-A413-4632-9D5E-8A22483E4329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26D7344-D86B-4BD8-97A5-F33DDCE825D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C16CB0-F061-49FA-81FF-4698E0AB6C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"753E5480-95BE-47D5-A020-0A7B95B41A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D4E217-4934-40FF-B797-2697625C4A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E717996-F17E-4D82-8C18-D8590ECC8AB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43EC45F1-F990-4D58-90D7-86E7FE57B116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D65BD5-BCCA-4C69-A9A4-E322AEBEE6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6392BFDC-B18A-435D-A296-36CCF0AF6CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86CF9343-8A2C-40AB-88EC-266CB971A7D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6386086-1DDB-4FE9-A6A3-10B3071B1A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E524D607-DE24-4E1C-9DA3-761367BE5CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9167551C-9C57-4DB4-AE7A-623A800456C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DD9514-FCDD-4BFE-A1FD-1A44E07671FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8899BFF7-4077-46D4-BC20-B8FC31D76BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C90E281-33F1-4010-A5A4-CB551C2B59C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491A4C7C-DF73-4159-9D6F-5884163C5A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B45050F1-B4AD-45E5-A3BB-4CA138224354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F6F8A5-6735-4FB9-81A5-F7EB5D8F2552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860DA6E4-9E95-47AB-94C5-B9E8DBB90048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29E1B268-981F-4B85-89E5-F46B05EDCBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDF45D73-2BAE-489F-AAE7-9382DBF4BF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D46F044-9B22-4C21-9EC1-33B0D3C9BBEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A124B239-5ADB-459F-90EF-308C09D6B87F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8F319C-1212-4787-A1E8-15D576527EF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17E12D85-196F-4723-A4EC-7DC900087AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D70BC2-A8C7-4BA3-B976-B9B48283BEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABE8371-E4FD-4A10-A2C0-64952F25430D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D4CA0D-872F-4627-A634-95ADB76C3F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538D4C75-2DAB-434A-91F4-C28187878862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E4EB84-AC3D-4390-9C8F-E6D0CACB1B8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4101AE-6D14-4982-8F7F-1BFE9003C99F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D48151F-554D-49FE-97DD-3FD1FFDDAA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB7532A-1C2F-4F47-9550-A5019B7382AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2823D06C-99B3-4959-9821-CC5A850E11C5\"}]}]}],\"references\":[{\"url\":\"http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2035.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/537147/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/80696\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.apache.org/jira/browse/CAMEL-9309\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.