Description
Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including "$simple{}" in a CamelFileName message header to a (1) FILE or (2) FTP producer.
Published: 2013-10-04
Score: 6.8 Medium
EPSS: 18.0% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x9fv-c87w-55wc Improper Control of Generation of Code in Apache Camel
History

No history.

Subscriptions

Apache Camel
Redhat Fuse Esb Enterprise Fuse Management Console Fuse Mq Enterprise Jboss Amq Jboss Bpms Jboss Brms Jboss Fuse Jboss Fuse Service Works Openshift
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T16:38:02.021Z

Reserved: 2013-06-12T00:00:00.000Z

Link: CVE-2013-4330

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-10-04T17:55:09.853

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-4330

cve-icon Redhat

Severity : Important

Publid Date: 2013-09-30T00:00:00Z

Links: CVE-2013-4330 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses