| -----BEGIN PGP SIGNED MESSAGE----- |
| Hash: SHA1 |
| |
| CVE-2017-12633: Apache Camel's Hessian unmarshalling operation is vulnerable |
| to Remote Code Execution attacks |
| |
| Severity: MEDIUM |
| |
| Vendor: The Apache Software Foundation |
| |
| Versions Affected: Camel 2.19.0 to 2.19.3 and Camel 2.20.0 |
| The unsupported Camel 2.x (2.18 and earlier) versions may be also affected. |
| |
| Description: Apache Camel's camel-hessian component is vulnerable to Java object |
| de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. |
| |
| Mitigation: 2.19.x users should upgrade to 2.19.4, 2.20.0 users should upgrade to 2.20.1. |
| |
| The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-11923 |
| refers to the various commits that resovoled the issue, and have more details. |
| |
| Credit: This issue was discovered by Moritz Bechler from AgNO3 GmbH & Co. |
| -----BEGIN PGP SIGNATURE----- |
| Version: GnuPG v2.0.22 (GNU/Linux) |
| |
| iQEcBAEBAgAGBQJaC/hCAAoJEONOnzgC/0EANYoH/3L/EMwTMeF/bHw+rHN6TYEf |
| vS6fYmpG9zygJt0yIA+yHqgidxKdtPHpoOnBhCw/pQsoiEpDTe75eiilTE6j5U1d |
| DDtHri3Im45WEL28BeHfb5Eme2ccVj055pYgPnQpGTN2cO5+rkykWdU/obfk44Rr |
| 01b8a+i0nM+LJ9N6Tw8n1wQMvfwNYQTHdK1RVXYbm2JedjJYHGBgqgjEZOfrCQ1r |
| QNqSr9U0hkt0CdYgxGIY2WJi/AIHwLbOuYH3u+m02WJgw2abJRRabLNMiQCz93IF |
| k9FZBUTf2I45FPpT/Y5FC5+HgKzW40vTCRAcuZlpwdq9Kv8nF3DFcsPVxBSM9ok= |
| =knWB |
| -----END PGP SIGNATURE----- |