Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apache:camel:2.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "2823D06C-99B3-4959-9821-CC5A850E11C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDAFA7CF-DD09-484A-A1E9-89EFB7AF5ED2", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "E7116415-89C0-4D83-8173-E3EBCF71F51F", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "540EE44D-01AF-4AC2-BC76-DA6917F42DEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "C265A5EE-C7E8-48E4-892B-9B87198A8166", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "4057EE83-770C-4448-A020-3ADBA340B01E", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CE7AA4A-DCC5-4074-9509-A24FAB558527", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8DB9E52-C5B3-469B-8C04-B2DFDF6199D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "DD84467E-AAC5-4147-A295-75BA169B1318", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*", "matchCriteriaId": "A427238F-0D26-44AF-90A7-394A14B185FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "706C1A6D-2C4D-4A8F-BB64-4E36954CB0B7", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC9C31F3-91A7-4BBF-B5FA-44C2C008A71F", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks."}, {"lang": "es", "value": "Apache Camel's Jackson y JacksonXML operaci\u00f3n unmarshalling son vulnerables a ataques de ejecuci\u00f3n remota de c\u00f3digo."}], "id": "CVE-2016-8749", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-03-28T18:59:00.143", "references": [{"source": "security@apache.org", "tags": ["Vendor Advisory"], "url": "http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2"}, {"source": "security@apache.org", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://www.openwall.com/lists/oss-security/2017/05/22/2"}, {"source": "security@apache.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/97179"}, {"source": "security@apache.org", "tags": ["Third Party Advisory"], "url": "https://access.redhat.com/errata/RHSA-2017:1832"}, {"source": "security@apache.org", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"}, {"source": "security@apache.org", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"}, {"source": "security@apache.org", "tags": ["Exploit", "Technical Description", "Third Party Advisory"], "url": "https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://www.openwall.com/lists/oss-security/2017/05/22/2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/97179"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://access.redhat.com/errata/RHSA-2017:1832"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Technical Description", "Third Party Advisory"], "url": "https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true"}], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-502"}], "source": "nvd@nist.gov", "type": "Primary"}]}