7.5
CVSSv3

CVE-2019-0188

CVSSv4: NA | CVSSv3: 7.5 | CVSSv2: 5 | VMScore: 850 | EPSS: 0.00505 | KEV: Not Included
Published: 28/05/2019 Updated: 21/11/2024

Vulnerability Summary

Apache Camel before 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache camel

oracle enterprise data quality 11.1.1.9.0

oracle enterprise manager base platform 13.3.0.0

oracle enterprise manager base platform 13.4.0.0

oracle flexcube private banking 12.0.0

oracle flexcube private banking 12.1.0

oracle enterprise repository 12.1.3.0.0

Vendor Advisories

Impact: Moderate Public Date: 2019-05-22 CWE: CWE-611 Bugzilla: 1719519: CVE-2019-0188 camel-xmljson: X ...

Mailing Lists

A new security advisory has been released for Apache Camel, that is fixed in the recent 2240 release CVE-2019-0188: Apache Camel vulnerable to XML external entity injection (XXE) Severity: MEDIUM Vendor: The Apache Software Foundation Versions Affected: Apache Camel versions prior to 2240 Description: Apache Camel contains an XML external ...
A new security advisory has been released for Apache Camel, that is fixed in the recent 2240 release CVE-2019-0188: Apache Camel-XMLJson vulnerable to XML external entity injection (XXE)  Severity: MEDIUM Vendor: The Apache Software Foundation Versions Affected: Apache Camel versions prior to 2240 Description: Apache Camel provided c ...

References

CWE-611https://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2019-0188https://www.first.org/epsshttp://jvn.jp/en/jp/JVN71498764/index.htmlhttp://www.openwall.com/lists/oss-security/2019/05/24/2http://www.securityfocus.com/bid/108422https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.aschttps://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44%40%3Cusers.camel.apache.org%3Ehttps://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab%40%3Cdev.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3Ehttps://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d%40%3Cdev.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036%40%3Cdev.tamaya.apache.org%3Ehttps://www.oracle.com/security-alerts/cpujan2021.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttp://jvn.jp/en/jp/JVN71498764/index.htmlhttp://www.openwall.com/lists/oss-security/2019/05/24/2http://www.securityfocus.com/bid/108422https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.aschttps://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44%40%3Cusers.camel.apache.org%3Ehttps://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab%40%3Cdev.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5%40%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3Ehttps://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d%40%3Cdev.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036%40%3Cdev.tamaya.apache.org%3Ehttps://www.oracle.com/security-alerts/cpujan2021.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html