9.8
CVSSv3

CVE-2016-8749

Published: 28/03/2017 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache camel 2.17.0

apache camel 2.17.2

apache camel 2.17.4

apache camel 2.16.0

apache camel 2.16.4

apache camel 2.16.3

apache camel 2.17.3

apache camel 2.18.0

apache camel 2.16.1

apache camel 2.17.1

apache camel 2.16.2

apache camel 2.18.1

Vendor Advisories

It was found that Apache Camel's camel-jackson and camel-jacksonxml components are vulnerable to Java object de-serialisation vulnerability Camel allows such a type through the 'CamelJacksonUnmarshalType' property De-serializing untrusted data can lead to security flaws as demonstrated in various similar reports about Java de-serialization issues ...

Github Repositories

Insecure Java Deserialization in the Jackson Library & How It Can Escalate to RCE Insecure deserialization is a security vulnerability that occurs when a software application deserializes data from an untrusted or malicious source without proper validation and protection This vulnerability can be exploited by attackers to execute arbitrary code, gain unauthorized acces