ID CVE-2017-3159
Summary Apache Camel's camel-snakeyaml component is vulnerable to Java object de-serialization vulnerability. De-serializing untrusted data can lead to security flaws.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:camel:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:1.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:1.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.0.0:m1:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.0.0:m1:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.0.0:m2:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.0.0:m2:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.0.0:m3:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.0.0:m3:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.11.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.11.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.12.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.12.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.12.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.12.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.13.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.13.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.13.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.13.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.14.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.14.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.14.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.14.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.14.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.14.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 24-05-2019 - 11:29)
Impact:
Exploitability:
CWE CWE-502
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
redhat via4
advisories
rhsa
id RHSA-2017:0868
refmap via4
bid 96321
confirm http://camel.apache.org/security-advisories.data/CVE-2017-3159.txt.asc?version=1&modificationDate=1486565167000&api=v2
misc https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true
mlist
  • [camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html
  • [camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html
  • [oss-security] 20170522 Code Execution through a variety Java (Un-)Marshallers
Last major update 24-05-2019 - 11:29
Published 07-03-2017 - 15:59
Back to Top