Apache Camel 2.6.x up to and including 2.14.x, 2.15.x prior to 2.15.5, and 2.16.x prior to 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote malicious users to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache camel 2.15.0 |
||
apache camel 2.13.4 |
||
apache camel 2.9.8 |
||
apache camel 2.9.4 |
||
apache camel 2.15.3 |
||
apache camel 2.15.4 |
||
apache camel 2.13.0 |
||
apache camel 2.7.1 |
||
apache camel 2.15.2 |
||
apache camel 2.10.6 |
||
apache camel 2.12.3 |
||
apache camel 2.9.6 |
||
apache camel 2.7.2 |
||
apache camel 2.8.6 |
||
apache camel 2.12.1 |
||
apache camel 2.13.3 |
||
apache camel 2.10.0 |
||
apache camel 2.11.0 |
||
apache camel 2.9.0 |
||
apache camel 2.7.5 |
||
apache camel 2.8.3 |
||
apache camel 2.10.7 |
||
apache camel 2.16.0 |
||
apache camel 2.12.5 |
||
apache camel 2.9.1 |
||
apache camel 2.8.0 |
||
apache camel 2.14.0 |
||
apache camel 2.11.4 |
||
apache camel 2.14.2 |
||
apache camel 2.9.5 |
||
apache camel 2.10.4 |
||
apache camel 2.11.2 |
||
apache camel 2.10.1 |
||
apache camel 2.14.3 |
||
apache camel 2.12.0 |
||
apache camel 2.14.4 |
||
apache camel 2.8.4 |
||
apache camel 2.9.2 |
||
apache camel 2.10.3 |
||
apache camel 2.7.0 |
||
apache camel 2.8.1 |
||
apache camel 2.12.4 |
||
apache camel 2.7.4 |
||
apache camel 2.10.5 |
||
apache camel 2.12.2 |
||
apache camel 2.13.1 |
||
apache camel 2.15.1 |
||
apache camel 2.11.1 |
||
apache camel 2.13.2 |
||
apache camel 2.11.3 |
||
apache camel 2.7.3 |
||
apache camel 2.9.3 |
||
apache camel 2.14.1 |
||
apache camel 2.6.0 |
||
apache camel 2.9.7 |
||
apache camel 2.8.5 |
||
apache camel 2.10.2 |
||
apache camel 2.8.2 |