5
CVSSv2

CVE-2019-0188

Published: 28/05/2019 Updated: 15/03/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apache Camel before 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache camel

oracle enterprise data quality 11.1.1.9.0

oracle enterprise manager base platform 13.3.0.0

oracle enterprise manager base platform 13.4.0.0

oracle flexcube private banking 12.0.0

oracle flexcube private banking 12.1.0

oracle enterprise repository 12.1.3.0.0

Vendor Advisories

Impact: Moderate Public Date: 2019-05-22 CWE: CWE-611 Bugzilla: 1719519: CVE-2019-0188 camel-xmljson: X ...

Mailing Lists

A new security advisory has been released for Apache Camel, that is fixed in the recent 2240 release CVE-2019-0188: Apache Camel-XMLJson vulnerable to XML external entity injection (XXE)  Severity: MEDIUM Vendor: The Apache Software Foundation Versions Affected: Apache Camel versions prior to 2240 Description: Apache Camel provided conta ...
A new security advisory has been released for Apache Camel, that is fixed in the recent 2240 release CVE-2019-0188: Apache Camel vulnerable to XML external entity injection (XXE) Severity: MEDIUM Vendor: The Apache Software Foundation Versions Affected: Apache Camel versions prior to 2240 Description: Apache Camel contains an XML external ...

References

CWE-611https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3Ehttps://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.aschttp://www.securityfocus.com/bid/108422http://www.openwall.com/lists/oss-security/2019/05/24/2http://jvn.jp/en/jp/JVN71498764/index.htmlhttps://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3Ehttps://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3Ehttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/security-alerts/cpujan2021.htmlhttps://www.securityfocus.com/bid/108422https://tools.cisco.com/security/center/viewAlert.x?alertId=60238https://nvd.nist.gov