Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks.
References
Link | Resource |
---|---|
http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2017/05/22/2 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/97179 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:1832 | Third Party Advisory |
https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E | |
https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E | |
https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-03-28 18:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-8749
Mitre link : CVE-2016-8749
CVE.ORG link : CVE-2016-8749
JSON object : View
Products Affected
apache
- camel
CWE
CWE-502
Deserialization of Untrusted Data