Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-5348 (GCVE-0-2015-5348)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "RHSA-2016:2035", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "80696", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/80696" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-24T10:06:03", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "RHSA-2016:2035", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "80696", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/80696" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "RHSA-2016:2035", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "name": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc", "refsource": "CONFIRM", "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "name": "https://issues.apache.org/jira/browse/CAMEL-9309", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "80696", "refsource": "BID", "url": "http://www.securityfocus.com/bid/80696" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5348", "datePublished": "2016-04-15T15:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-5348\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-04-15T15:59:00.110\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.\"},{\"lang\":\"es\",\"value\":\"Apache Camel 2.6.x hasta la versi\u00f3n 2.14.x, 2.15.x en versiones anteriores a 2.15.5 y 2.16.x en versiones anteriores a 2.16.1, cuando se utiliza(1) camel-jetty o (2) camel-servlet como un consumidor en rutas Camel, permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un objeto Java serializado manipulado en una petici\u00f3n HTTP.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7F8143-7907-404B-8450-29B8D0993BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923393A5-5B57-426E-96FD-08F47A18CC68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B5D10E-A4A0-42AB-B6A1-7B4B433B75BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE84D0D4-105F-4CD0-91ED-449508386AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E701F1-5E53-44F1-8781-D37351A319F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE63834-D84A-45C0-96CB-4EC4258E1C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A6411F-679F-4B6C-9370-6D4D97C05256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D435FE-6266-4F3D-A17B-8611E005332C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89CE83EA-1DFC-4739-A8CB-2F514664D4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA7F756F-3D1B-477B-B0D5-F3916EC8705E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D02F8D5-84BA-49C5-89BB-FD8E81AFEA90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234661BC-ADFD-4580-A07B-B79BA620EB6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"731A1E0D-04E8-47DA-AFF1-25DCBEA458C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E8229D-2B40-4808-9B7C-867ABCE9F4EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D0B86A-7190-494B-B696-694FDB6B7736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE36D07F-3AA8-4B4E-872D-183D855734D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29694A50-A07C-4E64-B65A-B8DC0C402B60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"265735B4-6869-4C60-9F90-524B228EC0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D195962F-2BD9-47E0-AB21-05581FF9FDAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42B5BD9F-0CDD-4330-8B70-87EFEE5933B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"418FB30A-3172-469E-8539-2B8DA28F5BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F80FB4-28B0-42BA-B4B8-4A70C2D3445D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB5262A-23DD-4F62-8430-914E30B41A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB96EF4-A413-4632-9D5E-8A22483E4329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26D7344-D86B-4BD8-97A5-F33DDCE825D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C16CB0-F061-49FA-81FF-4698E0AB6C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"753E5480-95BE-47D5-A020-0A7B95B41A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D4E217-4934-40FF-B797-2697625C4A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E717996-F17E-4D82-8C18-D8590ECC8AB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43EC45F1-F990-4D58-90D7-86E7FE57B116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D65BD5-BCCA-4C69-A9A4-E322AEBEE6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6392BFDC-B18A-435D-A296-36CCF0AF6CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86CF9343-8A2C-40AB-88EC-266CB971A7D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6386086-1DDB-4FE9-A6A3-10B3071B1A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E524D607-DE24-4E1C-9DA3-761367BE5CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9167551C-9C57-4DB4-AE7A-623A800456C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DD9514-FCDD-4BFE-A1FD-1A44E07671FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8899BFF7-4077-46D4-BC20-B8FC31D76BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C90E281-33F1-4010-A5A4-CB551C2B59C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491A4C7C-DF73-4159-9D6F-5884163C5A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B45050F1-B4AD-45E5-A3BB-4CA138224354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F6F8A5-6735-4FB9-81A5-F7EB5D8F2552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860DA6E4-9E95-47AB-94C5-B9E8DBB90048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29E1B268-981F-4B85-89E5-F46B05EDCBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDF45D73-2BAE-489F-AAE7-9382DBF4BF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D46F044-9B22-4C21-9EC1-33B0D3C9BBEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A124B239-5ADB-459F-90EF-308C09D6B87F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8F319C-1212-4787-A1E8-15D576527EF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17E12D85-196F-4723-A4EC-7DC900087AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D70BC2-A8C7-4BA3-B976-B9B48283BEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABE8371-E4FD-4A10-A2C0-64952F25430D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D4CA0D-872F-4627-A634-95ADB76C3F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538D4C75-2DAB-434A-91F4-C28187878862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E4EB84-AC3D-4390-9C8F-E6D0CACB1B8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4101AE-6D14-4982-8F7F-1BFE9003C99F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D48151F-554D-49FE-97DD-3FD1FFDDAA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB7532A-1C2F-4F47-9550-A5019B7382AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:camel:2.16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2823D06C-99B3-4959-9821-CC5A850E11C5\"}]}]}],\"references\":[{\"url\":\"http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2035.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/537147/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/80696\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.apache.org/jira/browse/CAMEL-9309\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/537147/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/80696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.apache.org/jira/browse/CAMEL-9309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-26v6-w6fw-rh94
Vulnerability from github
Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-jetty" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.15.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-jetty" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "2.16.0" ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-servlet" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.15.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-servlet" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "2.16.0" ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-http" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.15.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-http" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "2.16.0" ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-http-common" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.15.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-http-common" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "2.16.0" ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-http4" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.15.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-http4" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "2.16.0" ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-ahc" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.15.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-ahc" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "2.16.0" ] } ], "aliases": [ "CVE-2015-5348" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2020-06-16T20:51:34Z", "nvd_published_at": null, "severity": "HIGH" }, "details": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.", "id": "GHSA-26v6-w6fw-rh94", "modified": "2023-12-19T22:56:00Z", "published": "2018-10-16T23:12:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/f7f0b18f6924fe0b01f32a25ed1e38e29b1bf8e5" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/e7fd5f049c2fd51a528f8062da91a1c75e33b0e8" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/d853853469292cd54fd9662c3605030ab5a9566b" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/c558f30a6d3820faa3d8c4ad5e54448914ec60d0" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/c47cffcadabca0c588753555a386942184a33627" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/a68434c258cdcd30587ae7adc5dabbac43eadbbf" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/9cbd5867fe73ef07ecba6f16d64689632e3f2a16" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/94330f99acb6f28155793b253de9956c3798f3bb" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/92081b203523c5ed502ed41df43cbd8655caf9b9" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/7e28d0af471ea992eb74807a4abd1626b88d678a" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/735ee02c693964b5f700af13a2adfeae56b848a4" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/5ea0a6f6c6a54f1cddf9691a99b0c237afc95348" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/515c822148d52de9e7cdf4f6b01f7b793f2f273f" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/4f065fe07c1dcd7b451e6005a6dc8e96d77da43e" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/44e6a3036e5a11d90b60c142cf51ed74b792de31" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/349109b0834764560f0be69eb74f43a16bd220b0" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/32eacdaff16f8709da55e27b83fa21a16d739f63" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/1b1ccbcd94860f6f1d8caf98fb59e6ab7b3940b4" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/190d7c81b7e3ce767514e319630b1bbaf27e6817" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/13e43c1412ad72d99030b4eb4cb72c84fa57d5ff" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/0afcf721ff209eb10a24c5e4b48ca9d6727ea99a" }, { "type": "WEB", "url": "https://github.com/apache/camel" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-26v6-w6fw-rh94" }, { "type": "WEB", "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/80696" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Apache Camel can allow remote attackers to execute arbitrary commands" }
rhsa-2016:2035
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Fuse 6.3, which fixes multiple security issues and includes several bug fixes and enhancements, is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform.\n\nRed Hat JBoss Fuse 6.3 is a minor product release that updates Red Hat JBoss Fuse 6.2.1, and includes several bug fixes and enhancements. Refer to the Release Notes document, available from the Product Documentation link in the References section, for a list of these changes.\n\nSecurity Fix(es):\n\nIt was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks. (CVE-2016-2141)\n\nA deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library. (CVE-2016-2510)\n\nIt was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content. (CVE-2016-4437)\n\nA denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed. (CVE-2015-3192)\n\nIt was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks. (CVE-2015-5344)\n\nIt was found that Apache Camel\u0027s Jetty/Servlet permitted object deserialization. If using camel-jetty or camel-servlet as a consumer in Camel routes, then Camel will automatically deserialize HTTP requests that use the content-header: application/x-java-serialized-object. An attacker could use this vulnerability to gain access to unauthorized information or conduct further attacks. (CVE-2015-5348)\n\nIt was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries. (CVE-2015-7940)\n\nThe CVE-2016-2141 issue was discovered by Dennis Reed (Red Hat).\n\nRefer to the Product Documentation link in the References section for installation instructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2035", "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3" }, { "category": "external", "summary": "1239002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002" }, { "category": "external", "summary": "1276272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272" }, { "category": "external", "summary": "1292849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849" }, { "category": "external", "summary": "1303609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609" }, { "category": "external", "summary": "1310647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647" }, { "category": "external", "summary": "1313589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589" }, { "category": "external", "summary": "1343346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2035.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update", "tracking": { "current_release_date": "2025-09-10T14:13:36+00:00", "generator": { "date": "2025-09-10T14:13:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2016:2035", "initial_release_date": "2016-10-06T16:18:07+00:00", "revision_history": [ { "date": "2016-10-06T16:18:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:13:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Fuse 6.3", "product": { "name": "Red Hat JBoss Fuse 6.3", "product_id": "Red Hat JBoss Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2015-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1239002" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed.", "title": "Vulnerability description" }, { "category": "summary", "text": "Framework: denial-of-service attack with XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3192" }, { "category": "external", "summary": "RHBZ#1239002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3192", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192" }, { "category": "external", "summary": "http://pivotal.io/security/cve-2015-3192", "url": "http://pivotal.io/security/cve-2015-3192" } ], "release_date": "2015-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Framework: denial-of-service attack with XML input" }, { "cve": "CVE-2015-5254", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2015-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1291292" } ], "notes": [ { "category": "description", "text": "It was found that use of a JMS ObjectMessage does not safely handle user supplied data when deserializing objects. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.", "title": "Vulnerability description" }, { "category": "summary", "text": "ObjectMessage: unsafe deserialization", "title": "Vulnerability summary" }, { "category": "other", "text": "A malicious message producer needs to authenticate to EAP in order to send messages. Also, the use of JMS ObjectMessage needs to be chosen by the developer of the application. Therefore this issue is rated as moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5254" }, { "category": "external", "summary": "RHBZ#1291292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5254", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254" }, { "category": "external", "summary": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt", "url": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt" } ], "release_date": "2015-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "workaround", "details": "If you do deploy a JMS publisher, and subscriber, and don\u0027t trust the messages sent to you by your clients, you could mitigate this issue by installing a Java agent which restricts the classes which can be deserialized. This is an article with the recommended approach:\n\nhttps://access.redhat.com/solutions/2190911\n\nYou could also mitigate this issue using the features of the Java Virtual Machine added in JEP 290:\n\nhttp://openjdk.java.net/jeps/290", "product_ids": [ "Red Hat JBoss Fuse 6.3" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ObjectMessage: unsafe deserialization" }, { "cve": "CVE-2015-5344", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1303609" } ], "notes": [ { "category": "description", "text": "It was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "camel-xstream: Java object de-serialization vulnerability leads to RCE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5344" }, { "category": "external", "summary": "RHBZ#1303609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5344", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344" }, { "category": "external", "summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2", "url": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "camel-xstream: Java object de-serialization vulnerability leads to RCE" }, { "cve": "CVE-2015-5348", "discovery_date": "2015-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1292849" } ], "notes": [ { "category": "description", "text": "It was found that Apache Camel\u0027s Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability. If using camel-jetty, or camel-servlet as a consumer in Camel routes, then Camel will automatically de-serialize HTTP requests that uses the content-header: application/x-java-serialized-object.", "title": "Vulnerability description" }, { "category": "summary", "text": "Camel: Java object deserialisation in Jetty/Servlet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5348" }, { "category": "external", "summary": "RHBZ#1292849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5348", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348" }, { "category": "external", "summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt", "url": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt" } ], "release_date": "2015-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Camel: Java object deserialisation in Jetty/Servlet" }, { "cve": "CVE-2015-7940", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2015-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1276272" } ], "notes": [ { "category": "description", "text": "It was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: Invalid curve attack allowing to extract private keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7940" }, { "category": "external", "summary": "RHBZ#1276272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7940", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940" } ], "release_date": "2015-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bouncycastle: Invalid curve attack allowing to extract private keys" }, { "acknowledgments": [ { "names": [ "Dennis Reed" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-2141", "discovery_date": "2015-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1313589" } ], "notes": [ { "category": "description", "text": "It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "JGroups: Authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2141" }, { "category": "external", "summary": "RHBZ#1313589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2141", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141" } ], "release_date": "2016-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "workaround", "details": "Please refer to https://access.redhat.com/articles/2360521 for more information.", "product_ids": [ "Red Hat JBoss Fuse 6.3" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JGroups: Authorization bypass" }, { "cve": "CVE-2016-2510", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310647" } ], "notes": [ { "category": "description", "text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.", "title": "Vulnerability description" }, { "category": "summary", "text": "bsh2: remote code execution via deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2510" }, { "category": "external", "summary": "RHBZ#1310647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2510" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510" }, { "category": "external", "summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6", "url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6" } ], "release_date": "2016-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bsh2: remote code execution via deserialization" }, { "cve": "CVE-2016-4437", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343346" } ], "notes": [ { "category": "description", "text": "It was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Security constraint bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4437" }, { "category": "external", "summary": "RHBZ#1343346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4437", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "shiro: Security constraint bypass" } ] }
rhsa-2016_2035
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Fuse 6.3, which fixes multiple security issues and includes several bug fixes and enhancements, is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform.\n\nRed Hat JBoss Fuse 6.3 is a minor product release that updates Red Hat JBoss Fuse 6.2.1, and includes several bug fixes and enhancements. Refer to the Release Notes document, available from the Product Documentation link in the References section, for a list of these changes.\n\nSecurity Fix(es):\n\nIt was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks. (CVE-2016-2141)\n\nA deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library. (CVE-2016-2510)\n\nIt was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content. (CVE-2016-4437)\n\nA denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed. (CVE-2015-3192)\n\nIt was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks. (CVE-2015-5344)\n\nIt was found that Apache Camel\u0027s Jetty/Servlet permitted object deserialization. If using camel-jetty or camel-servlet as a consumer in Camel routes, then Camel will automatically deserialize HTTP requests that use the content-header: application/x-java-serialized-object. An attacker could use this vulnerability to gain access to unauthorized information or conduct further attacks. (CVE-2015-5348)\n\nIt was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries. (CVE-2015-7940)\n\nThe CVE-2016-2141 issue was discovered by Dennis Reed (Red Hat).\n\nRefer to the Product Documentation link in the References section for installation instructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2035", "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3" }, { "category": "external", "summary": "1239002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002" }, { "category": "external", "summary": "1276272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272" }, { "category": "external", "summary": "1292849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849" }, { "category": "external", "summary": "1303609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609" }, { "category": "external", "summary": "1310647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647" }, { "category": "external", "summary": "1313589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589" }, { "category": "external", "summary": "1343346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2035.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update", "tracking": { "current_release_date": "2024-12-29T18:16:31+00:00", "generator": { "date": "2024-12-29T18:16:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2016:2035", "initial_release_date": "2016-10-06T16:18:07+00:00", "revision_history": [ { "date": "2016-10-06T16:18:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-29T18:16:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Fuse 6.3", "product": { "name": "Red Hat JBoss Fuse 6.3", "product_id": "Red Hat JBoss Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2015-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1239002" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed.", "title": "Vulnerability description" }, { "category": "summary", "text": "Framework: denial-of-service attack with XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3192" }, { "category": "external", "summary": "RHBZ#1239002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3192", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192" }, { "category": "external", "summary": "http://pivotal.io/security/cve-2015-3192", "url": "http://pivotal.io/security/cve-2015-3192" } ], "release_date": "2015-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Framework: denial-of-service attack with XML input" }, { "cve": "CVE-2015-5254", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2015-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1291292" } ], "notes": [ { "category": "description", "text": "It was found that use of a JMS ObjectMessage does not safely handle user supplied data when deserializing objects. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.", "title": "Vulnerability description" }, { "category": "summary", "text": "ObjectMessage: unsafe deserialization", "title": "Vulnerability summary" }, { "category": "other", "text": "A malicious message producer needs to authenticate to EAP in order to send messages. Also, the use of JMS ObjectMessage needs to be chosen by the developer of the application. Therefore this issue is rated as moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5254" }, { "category": "external", "summary": "RHBZ#1291292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5254", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254" }, { "category": "external", "summary": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt", "url": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt" } ], "release_date": "2015-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "workaround", "details": "If you do deploy a JMS publisher, and subscriber, and don\u0027t trust the messages sent to you by your clients, you could mitigate this issue by installing a Java agent which restricts the classes which can be deserialized. This is an article with the recommended approach:\n\nhttps://access.redhat.com/solutions/2190911\n\nYou could also mitigate this issue using the features of the Java Virtual Machine added in JEP 290:\n\nhttp://openjdk.java.net/jeps/290", "product_ids": [ "Red Hat JBoss Fuse 6.3" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ObjectMessage: unsafe deserialization" }, { "cve": "CVE-2015-5344", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1303609" } ], "notes": [ { "category": "description", "text": "It was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "camel-xstream: Java object de-serialization vulnerability leads to RCE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5344" }, { "category": "external", "summary": "RHBZ#1303609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5344", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344" }, { "category": "external", "summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2", "url": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "camel-xstream: Java object de-serialization vulnerability leads to RCE" }, { "cve": "CVE-2015-5348", "discovery_date": "2015-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1292849" } ], "notes": [ { "category": "description", "text": "It was found that Apache Camel\u0027s Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability. If using camel-jetty, or camel-servlet as a consumer in Camel routes, then Camel will automatically de-serialize HTTP requests that uses the content-header: application/x-java-serialized-object.", "title": "Vulnerability description" }, { "category": "summary", "text": "Camel: Java object deserialisation in Jetty/Servlet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5348" }, { "category": "external", "summary": "RHBZ#1292849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5348", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348" }, { "category": "external", "summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt", "url": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt" } ], "release_date": "2015-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Camel: Java object deserialisation in Jetty/Servlet" }, { "cve": "CVE-2015-7940", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2015-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1276272" } ], "notes": [ { "category": "description", "text": "It was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: Invalid curve attack allowing to extract private keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7940" }, { "category": "external", "summary": "RHBZ#1276272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7940", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940" } ], "release_date": "2015-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bouncycastle: Invalid curve attack allowing to extract private keys" }, { "acknowledgments": [ { "names": [ "Dennis Reed" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-2141", "discovery_date": "2015-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1313589" } ], "notes": [ { "category": "description", "text": "It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "JGroups: Authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2141" }, { "category": "external", "summary": "RHBZ#1313589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2141", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141" } ], "release_date": "2016-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "workaround", "details": "Please refer to https://access.redhat.com/articles/2360521 for more information.", "product_ids": [ "Red Hat JBoss Fuse 6.3" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JGroups: Authorization bypass" }, { "cve": "CVE-2016-2510", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310647" } ], "notes": [ { "category": "description", "text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.", "title": "Vulnerability description" }, { "category": "summary", "text": "bsh2: remote code execution via deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2510" }, { "category": "external", "summary": "RHBZ#1310647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2510" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510" }, { "category": "external", "summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6", "url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6" } ], "release_date": "2016-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bsh2: remote code execution via deserialization" }, { "cve": "CVE-2016-4437", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343346" } ], "notes": [ { "category": "description", "text": "It was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Security constraint bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4437" }, { "category": "external", "summary": "RHBZ#1343346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4437", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "shiro: Security constraint bypass" } ] }
RHSA-2016:2035
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Fuse 6.3, which fixes multiple security issues and includes several bug fixes and enhancements, is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform.\n\nRed Hat JBoss Fuse 6.3 is a minor product release that updates Red Hat JBoss Fuse 6.2.1, and includes several bug fixes and enhancements. Refer to the Release Notes document, available from the Product Documentation link in the References section, for a list of these changes.\n\nSecurity Fix(es):\n\nIt was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks. (CVE-2016-2141)\n\nA deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library. (CVE-2016-2510)\n\nIt was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content. (CVE-2016-4437)\n\nA denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed. (CVE-2015-3192)\n\nIt was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks. (CVE-2015-5344)\n\nIt was found that Apache Camel\u0027s Jetty/Servlet permitted object deserialization. If using camel-jetty or camel-servlet as a consumer in Camel routes, then Camel will automatically deserialize HTTP requests that use the content-header: application/x-java-serialized-object. An attacker could use this vulnerability to gain access to unauthorized information or conduct further attacks. (CVE-2015-5348)\n\nIt was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries. (CVE-2015-7940)\n\nThe CVE-2016-2141 issue was discovered by Dennis Reed (Red Hat).\n\nRefer to the Product Documentation link in the References section for installation instructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2035", "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3" }, { "category": "external", "summary": "1239002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002" }, { "category": "external", "summary": "1276272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272" }, { "category": "external", "summary": "1292849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849" }, { "category": "external", "summary": "1303609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609" }, { "category": "external", "summary": "1310647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647" }, { "category": "external", "summary": "1313589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589" }, { "category": "external", "summary": "1343346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2035.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update", "tracking": { "current_release_date": "2025-09-10T14:13:36+00:00", "generator": { "date": "2025-09-10T14:13:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2016:2035", "initial_release_date": "2016-10-06T16:18:07+00:00", "revision_history": [ { "date": "2016-10-06T16:18:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:13:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Fuse 6.3", "product": { "name": "Red Hat JBoss Fuse 6.3", "product_id": "Red Hat JBoss Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2015-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1239002" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed.", "title": "Vulnerability description" }, { "category": "summary", "text": "Framework: denial-of-service attack with XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3192" }, { "category": "external", "summary": "RHBZ#1239002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3192", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192" }, { "category": "external", "summary": "http://pivotal.io/security/cve-2015-3192", "url": "http://pivotal.io/security/cve-2015-3192" } ], "release_date": "2015-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Framework: denial-of-service attack with XML input" }, { "cve": "CVE-2015-5254", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2015-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1291292" } ], "notes": [ { "category": "description", "text": "It was found that use of a JMS ObjectMessage does not safely handle user supplied data when deserializing objects. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.", "title": "Vulnerability description" }, { "category": "summary", "text": "ObjectMessage: unsafe deserialization", "title": "Vulnerability summary" }, { "category": "other", "text": "A malicious message producer needs to authenticate to EAP in order to send messages. Also, the use of JMS ObjectMessage needs to be chosen by the developer of the application. Therefore this issue is rated as moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5254" }, { "category": "external", "summary": "RHBZ#1291292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5254", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254" }, { "category": "external", "summary": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt", "url": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt" } ], "release_date": "2015-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "workaround", "details": "If you do deploy a JMS publisher, and subscriber, and don\u0027t trust the messages sent to you by your clients, you could mitigate this issue by installing a Java agent which restricts the classes which can be deserialized. This is an article with the recommended approach:\n\nhttps://access.redhat.com/solutions/2190911\n\nYou could also mitigate this issue using the features of the Java Virtual Machine added in JEP 290:\n\nhttp://openjdk.java.net/jeps/290", "product_ids": [ "Red Hat JBoss Fuse 6.3" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ObjectMessage: unsafe deserialization" }, { "cve": "CVE-2015-5344", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1303609" } ], "notes": [ { "category": "description", "text": "It was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "camel-xstream: Java object de-serialization vulnerability leads to RCE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5344" }, { "category": "external", "summary": "RHBZ#1303609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5344", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344" }, { "category": "external", "summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2", "url": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "camel-xstream: Java object de-serialization vulnerability leads to RCE" }, { "cve": "CVE-2015-5348", "discovery_date": "2015-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1292849" } ], "notes": [ { "category": "description", "text": "It was found that Apache Camel\u0027s Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability. If using camel-jetty, or camel-servlet as a consumer in Camel routes, then Camel will automatically de-serialize HTTP requests that uses the content-header: application/x-java-serialized-object.", "title": "Vulnerability description" }, { "category": "summary", "text": "Camel: Java object deserialisation in Jetty/Servlet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5348" }, { "category": "external", "summary": "RHBZ#1292849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5348", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348" }, { "category": "external", "summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt", "url": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt" } ], "release_date": "2015-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Camel: Java object deserialisation in Jetty/Servlet" }, { "cve": "CVE-2015-7940", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2015-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1276272" } ], "notes": [ { "category": "description", "text": "It was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: Invalid curve attack allowing to extract private keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7940" }, { "category": "external", "summary": "RHBZ#1276272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7940", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940" } ], "release_date": "2015-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bouncycastle: Invalid curve attack allowing to extract private keys" }, { "acknowledgments": [ { "names": [ "Dennis Reed" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-2141", "discovery_date": "2015-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1313589" } ], "notes": [ { "category": "description", "text": "It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "JGroups: Authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2141" }, { "category": "external", "summary": "RHBZ#1313589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2141", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141" } ], "release_date": "2016-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" }, { "category": "workaround", "details": "Please refer to https://access.redhat.com/articles/2360521 for more information.", "product_ids": [ "Red Hat JBoss Fuse 6.3" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JGroups: Authorization bypass" }, { "cve": "CVE-2016-2510", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310647" } ], "notes": [ { "category": "description", "text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.", "title": "Vulnerability description" }, { "category": "summary", "text": "bsh2: remote code execution via deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2510" }, { "category": "external", "summary": "RHBZ#1310647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2510" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510" }, { "category": "external", "summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6", "url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6" } ], "release_date": "2016-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bsh2: remote code execution via deserialization" }, { "cve": "CVE-2016-4437", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343346" } ], "notes": [ { "category": "description", "text": "It was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Security constraint bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4437" }, { "category": "external", "summary": "RHBZ#1343346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4437", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-06T16:18:07+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2035" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.3" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "shiro: Security constraint bypass" } ] }
fkie_cve-2015-5348
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F8143-7907-404B-8450-29B8D0993BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "923393A5-5B57-426E-96FD-08F47A18CC68", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5D10E-A4A0-42AB-B6A1-7B4B433B75BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "AE84D0D4-105F-4CD0-91ED-449508386AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "80E701F1-5E53-44F1-8781-D37351A319F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "1DE63834-D84A-45C0-96CB-4EC4258E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A1A6411F-679F-4B6C-9370-6D4D97C05256", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1D435FE-6266-4F3D-A17B-8611E005332C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "89CE83EA-1DFC-4739-A8CB-2F514664D4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "EA7F756F-3D1B-477B-B0D5-F3916EC8705E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D02F8D5-84BA-49C5-89BB-FD8E81AFEA90", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "234661BC-ADFD-4580-A07B-B79BA620EB6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "731A1E0D-04E8-47DA-AFF1-25DCBEA458C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "47E8229D-2B40-4808-9B7C-867ABCE9F4EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0D0B86A-7190-494B-B696-694FDB6B7736", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FE36D07F-3AA8-4B4E-872D-183D855734D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "29694A50-A07C-4E64-B65A-B8DC0C402B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "265735B4-6869-4C60-9F90-524B228EC0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "D195962F-2BD9-47E0-AB21-05581FF9FDAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "42B5BD9F-0CDD-4330-8B70-87EFEE5933B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "418FB30A-3172-469E-8539-2B8DA28F5BCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "A2F80FB4-28B0-42BA-B4B8-4A70C2D3445D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "BBB5262A-23DD-4F62-8430-914E30B41A59", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DB96EF4-A413-4632-9D5E-8A22483E4329", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "D26D7344-D86B-4BD8-97A5-F33DDCE825D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8C16CB0-F061-49FA-81FF-4698E0AB6C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "753E5480-95BE-47D5-A020-0A7B95B41A4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "02D4E217-4934-40FF-B797-2697625C4A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E717996-F17E-4D82-8C18-D8590ECC8AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "43EC45F1-F990-4D58-90D7-86E7FE57B116", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "B1D65BD5-BCCA-4C69-A9A4-E322AEBEE6F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "6392BFDC-B18A-435D-A296-36CCF0AF6CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "86CF9343-8A2C-40AB-88EC-266CB971A7D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6386086-1DDB-4FE9-A6A3-10B3071B1A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "E524D607-DE24-4E1C-9DA3-761367BE5CCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "9167551C-9C57-4DB4-AE7A-623A800456C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8DD9514-FCDD-4BFE-A1FD-1A44E07671FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "8899BFF7-4077-46D4-BC20-B8FC31D76BA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C90E281-33F1-4010-A5A4-CB551C2B59C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "491A4C7C-DF73-4159-9D6F-5884163C5A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "B45050F1-B4AD-45E5-A3BB-4CA138224354", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "54F6F8A5-6735-4FB9-81A5-F7EB5D8F2552", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "860DA6E4-9E95-47AB-94C5-B9E8DBB90048", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "29E1B268-981F-4B85-89E5-F46B05EDCBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDF45D73-2BAE-489F-AAE7-9382DBF4BF3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "2D46F044-9B22-4C21-9EC1-33B0D3C9BBEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "A124B239-5ADB-459F-90EF-308C09D6B87F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF8F319C-1212-4787-A1E8-15D576527EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "17E12D85-196F-4723-A4EC-7DC900087AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "D6D70BC2-A8C7-4BA3-B976-B9B48283BEEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "1ABE8371-E4FD-4A10-A2C0-64952F25430D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4D4CA0D-872F-4627-A634-95ADB76C3F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "538D4C75-2DAB-434A-91F4-C28187878862", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "94E4EB84-AC3D-4390-9C8F-E6D0CACB1B8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "2F4101AE-6D14-4982-8F7F-1BFE9003C99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "2D48151F-554D-49FE-97DD-3FD1FFDDAA26", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EB7532A-1C2F-4F47-9550-A5019B7382AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:camel:2.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "2823D06C-99B3-4959-9821-CC5A850E11C5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request." }, { "lang": "es", "value": "Apache Camel 2.6.x hasta la versi\u00f3n 2.14.x, 2.15.x en versiones anteriores a 2.15.5 y 2.16.x en versiones anteriores a 2.16.1, cuando se utiliza(1) camel-jetty o (2) camel-servlet como un consumidor en rutas Camel, permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un objeto Java serializado manipulado en una petici\u00f3n HTTP." } ], "id": "CVE-2015-5348", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-15T15:59:00.110", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "source": "secalert@redhat.com", "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/80696" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/80696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
wid-sec-w-2024-3616
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JBoss Fuse ist ein Open Source Enterprise Service Bus (ESB).\r\nJBoss A-MQ ist eine Messaging-Plattform.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat JBoss Fuse und Red Hat JBoss A-MQ ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen, vertrauliche Daten einzusehen, Informationen zu manipulieren oder Sicherheitsmechanismen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3616 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2024-3616.json" }, { "category": "self", "summary": "WID-SEC-2024-3616 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3616" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:2036-1 vom 2016-10-06", "url": "https://rhn.redhat.com/errata/RHSA-2016-2036.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:2035-1 vom 2016-10-06", "url": "https://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "category": "external", "summary": "Juniper Security Advisory JSA11023 vom 2020-07-08", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7139-1 vom 2024-12-05", "url": "https://ubuntu.com/security/notices/USN-7139-1" } ], "source_lang": "en-US", "title": "Red Hat JBoss Fuse: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-05T23:00:00.000+00:00", "generator": { "date": "2024-12-06T09:15:40.792+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3616", "initial_release_date": "2016-10-06T22:00:00.000+00:00", "revision_history": [ { "date": "2016-10-06T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-10-06T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-10-06T22:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2019-06-18T22:00:00.000+00:00", "number": "4", "summary": "Referenz(en) aufgenommen: RHSA-2019:1545" }, { "date": "2020-07-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2024-12-05T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c20.1R1", "product": { "name": "Juniper Junos Space \u003c20.1R1", "product_id": "T016874" } }, { "category": "product_version", "name": "20.1R1", "product": { "name": "Juniper Junos Space 20.1R1", "product_id": "T016874-fixed", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:20.1r1" } } } ], "category": "product_name", "name": "Junos Space" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6.3", "product": { "name": "Red Hat JBoss A-MQ 6.3", "product_id": "T008598", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:6.3" } } } ], "category": "product_name", "name": "JBoss A-MQ" }, { "branches": [ { "category": "product_version", "name": "6.3", "product": { "name": "Red Hat JBoss Fuse 6.3", "product_id": "T008597", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.3" } } } ], "category": "product_name", "name": "JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3192", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat JBoss Fuse und Red Hat JBoss A-MQ. Die Schwachstelle besteht im Spring Framework und beruht auf der Art und WEise, wie \"inline DTD Deklarationen\" verarbeitet werden. Ein Angreifer kann dieses durch \u00dcbermitteln geeignet gestalteter XML Daten zu einem Denial of Service Angirff nutzen." } ], "product_status": { "known_affected": [ "T008598", "T000126", "T016874", "T008597" ] }, "release_date": "2016-10-06T22:00:00.000+00:00", "title": "CVE-2015-3192" }, { "cve": "CVE-2015-5344", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat JBoss Fuse in der Apache Camel camel-xstream Komponente. Die Schwachstelle beruht auf einem Deseialisierungfehler von Java Objekten. Ein Angreifer kann dieses nutzen und u. a. vertrauliche Daten einsehen oder Code zur Ausf\u00fchrung bringen." } ], "product_status": { "known_affected": [ "T000126", "T008597" ] }, "release_date": "2016-10-06T22:00:00.000+00:00", "title": "CVE-2015-5344" }, { "cve": "CVE-2015-5348", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat JBoss Fuse. Die Schwachstelle besteht in dem Apache Camels Jetty/Servlet und beruht auf einem Deserialisierungsfehler. Ein Angreifer kann dieses durch \u00dcbermitteln geeignet gestalteter Daten nutzen und beliebigen Code zur Ausf\u00fchrung bringen." } ], "product_status": { "known_affected": [ "T000126", "T008597" ] }, "release_date": "2016-10-06T22:00:00.000+00:00", "title": "CVE-2015-5348" }, { "cve": "CVE-2015-7940", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat JBoss Fuse und Red Hat JBoss A-MQ in der Komponente \"bouncycastle\". Die Schwachstelle beruht darauf, dass ein Angreifer private Schl\u00fcssel bei Verwendung von elliptischen Kurven in der Kryptographie auslesen kann." } ], "product_status": { "known_affected": [ "T008598", "T000126", "T008597" ] }, "release_date": "2016-10-06T22:00:00.000+00:00", "title": "CVE-2015-7940" }, { "cve": "CVE-2016-2141", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat JBoss Fuse. Die Schwachstelle beruht darauf, dass neue Nodes durch JGroups nicht korrekt authentisiert werden. Ein Angreifer kann dieses nutzen und Sicherheitsmechanismen umgehen." } ], "product_status": { "known_affected": [ "T000126", "T008597" ] }, "release_date": "2016-10-06T22:00:00.000+00:00", "title": "CVE-2016-2141" }, { "cve": "CVE-2016-2510", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat JBoss Fuse im Zusammenhang mit BeanShell. Ein anonymer, entfernter Angreifer kann diese Schwachstelle nutzen, um bei der Deserialisierung einer speziell konstruierten Klassenkette beliebigen Programmcode mit den Rechten des Dienstes auszuf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T000126", "T008597" ] }, "release_date": "2016-10-06T22:00:00.000+00:00", "title": "CVE-2016-2510" }, { "cve": "CVE-2016-4437", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat JBoss Fuse und Red Hat JBoss A-MQ. Die Schwachstelle besteht in darin, dass Apache Shiro einen Standardschl\u00fcssel f\u00fcr die \"remember me\" Funktion verwendet. Ein Angreifer kann dieses ausnutzen und unautorisiert Zugriff auf die Inhalte erlangen." } ], "product_status": { "known_affected": [ "T008598", "T000126", "T008597" ] }, "release_date": "2016-10-06T22:00:00.000+00:00", "title": "CVE-2016-4437" } ] }
gsd-2015-5348
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-5348", "description": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.", "id": "GSD-2015-5348", "references": [ "https://access.redhat.com/errata/RHSA-2016:2035" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-5348" ], "details": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.", "id": "GSD-2015-5348", "modified": "2023-12-13T01:20:05.875556Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "RHSA-2016:2035", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "name": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc", "refsource": "CONFIRM", "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "name": "https://issues.apache.org/jira/browse/CAMEL-9309", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "80696", "refsource": "BID", "url": "http://www.securityfocus.com/bid/80696" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.15.5),[2.16.0]", "affected_versions": "All versions before 2.15.5, version 2.16.0", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-19", "CWE-78", "CWE-937" ], "date": "2021-08-30", "description": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.", "fixed_versions": [ "2.15.5", "2.16.1" ], "identifier": "CVE-2015-5348", "identifiers": [ "GHSA-26v6-w6fw-rh94", "CVE-2015-5348" ], "not_impacted": "All versions starting from 2.15.5 before 2.16.0, all versions after 2.16.0", "package_slug": "maven/org.apache.camel/camel-jetty", "pubdate": "2018-10-16", "solution": "Upgrade to versions 2.15.5, 2.16.1 or above.", "title": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2015-5348", "https://github.com/advisories/GHSA-26v6-w6fw-rh94" ], "uuid": "e0497851-e648-41d5-b7c4-5054d39c110b" }, { "affected_range": "(,2.15.5),[2.16.0]", "affected_versions": "All versions before 2.15.5, version 2.16.0", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-19", "CWE-78", "CWE-937" ], "date": "2021-08-30", "description": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.", "fixed_versions": [ "2.15.5", "2.16.1" ], "identifier": "CVE-2015-5348", "identifiers": [ "GHSA-26v6-w6fw-rh94", "CVE-2015-5348" ], "not_impacted": "All versions starting from 2.15.5 before 2.16.0, all versions after 2.16.0", "package_slug": "maven/org.apache.camel/camel-servlet", "pubdate": "2018-10-16", "solution": "Upgrade to versions 2.15.5, 2.16.1 or above.", "title": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2015-5348", "https://github.com/advisories/GHSA-26v6-w6fw-rh94" ], "uuid": "ab02a19a-aded-43dc-a139-6115a617c529" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:camel:2.16.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5348" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-19" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html" }, { "name": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc" }, { "name": "https://issues.apache.org/jira/browse/CAMEL-9309", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/CAMEL-9309" }, { "name": "80696", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/80696" }, { "name": "RHSA-2016:2035", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html" }, { "name": "20151217 CVE-2015-5348 - Apache Camel medium disclosure vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/537147/100/0/threaded" }, { "name": "[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "name": "[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM" }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } }, "lastModifiedDate": "2019-05-24T11:29Z", "publishedDate": "2016-04-15T15:59Z" } } }
cnvd-2015-08442
Vulnerability from cnvd
Title: Apache Camel Java对象反序列化漏洞
Description:
Apache Camel是基于已知的企业级集成模式上的开源集成框架。
Camel路由器中,若将camel-jetty或camel-servlet用作consumer,Camel会自动反序列化使用content-header: application/x-java-serialized-object的HTTP请求,远程攻击者可以利用漏洞获取敏感信息。
Severity: 中
Patch Name: Apache Camel Java对象反序列化漏洞的补丁
Patch Description:
Apache Camel是基于已知的企业级集成模式上的开源集成框架。
Camel路由器中,若将camel-jetty或camel-servlet用作consumer,Camel会自动反序列化使用content-header: application/x-java-serialized-object的HTTP请求,远程攻击者可以利用漏洞获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc?version=1&modificationDate=1450340845000&api=v2
Reference: http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc?version=1&modificationDate=1450340845000&api=v2
Name | Apache Camel |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2015-5348" } }, "description": "Apache Camel\u662f\u57fa\u4e8e\u5df2\u77e5\u7684\u4f01\u4e1a\u7ea7\u96c6\u6210\u6a21\u5f0f\u4e0a\u7684\u5f00\u6e90\u96c6\u6210\u6846\u67b6\u3002\r\n\r\nCamel\u8def\u7531\u5668\u4e2d\uff0c\u82e5\u5c06camel-jetty\u6216camel-servlet\u7528\u4f5cconsumer\uff0cCamel\u4f1a\u81ea\u52a8\u53cd\u5e8f\u5217\u5316\u4f7f\u7528content-header: application/x-java-serialized-object\u7684HTTP\u8bf7\u6c42\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002", "discovererName": "apache", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc?version=1\u0026modificationDate=1450340845000\u0026api=v2", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-08442", "openTime": "2015-12-23", "patchDescription": "Apache Camel\u662f\u57fa\u4e8e\u5df2\u77e5\u7684\u4f01\u4e1a\u7ea7\u96c6\u6210\u6a21\u5f0f\u4e0a\u7684\u5f00\u6e90\u96c6\u6210\u6846\u67b6\u3002\r\n\r\nCamel\u8def\u7531\u5668\u4e2d\uff0c\u82e5\u5c06camel-jetty\u6216camel-servlet\u7528\u4f5cconsumer\uff0cCamel\u4f1a\u81ea\u52a8\u53cd\u5e8f\u5217\u5316\u4f7f\u7528content-header: application/x-java-serialized-object\u7684HTTP\u8bf7\u6c42\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apache Camel Java\u5bf9\u8c61\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Apache Camel" }, "referenceLink": "http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc?version=1\u0026modificationDate=1450340845000\u0026api=v2", "serverity": "\u4e2d", "submitTime": "2015-12-20", "title": "Apache Camel Java\u5bf9\u8c61\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.