Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:1832 | third party advisory vendor advisory |
https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true | exploit third party advisory technical description |
http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2 | vendor advisory |
http://www.securityfocus.com/bid/97179 | vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2017/05/22/2 | third party advisory mailing list |
https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E | mailing list |
https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E | mailing list |