{"containers":{"cna":{"affected":[{"product":"Apache Camel","vendor":"Apache Software Foundation","versions":[{"status":"affected","version":"2.19.0 to 2.19.3"},{"status":"affected","version":"2.20.0"},{"status":"affected","version":"The unsupported Camel 2.x (2.18 and earlier) versions may be also affected."}]}],"datePublic":"2017-11-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws."}],"problemTypes":[{"descriptions":[{"description":"Apache Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution attacks","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-05-24T10:06:04.000Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"name":"101874","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/101874"},{"name":"RHSA-2018:0319","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2018:0319"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.apache.org/jira/browse/CAMEL-11923"},{"tags":["x_refsource_CONFIRM"],"url":"http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc"},{"name":"[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"},{"name":"[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","DATE_PUBLIC":"2017-11-15T00:00:00","ID":"CVE-2017-12633","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Camel","version":{"version_data":[{"version_value":"2.19.0 to 2.19.3"},{"version_value":"2.20.0"},{"version_value":"The unsupported Camel 2.x (2.18 and earlier) versions may be also affected."}]}}]},"vendor_name":"Apache Software Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Apache Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution attacks"}]}]},"references":{"reference_data":[{"name":"101874","refsource":"BID","url":"http://www.securityfocus.com/bid/101874"},{"name":"RHSA-2018:0319","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2018:0319"},{"name":"https://issues.apache.org/jira/browse/CAMEL-11923","refsource":"CONFIRM","url":"https://issues.apache.org/jira/browse/CAMEL-11923"},{"name":"http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc","refsource":"CONFIRM","url":"http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc"},{"name":"[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html","refsource":"MLIST","url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"name":"[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html","refsource":"MLIST","url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T18:43:56.449Z"},"title":"CVE Program Container","references":[{"name":"101874","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/101874"},{"name":"RHSA-2018:0319","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2018:0319"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.apache.org/jira/browse/CAMEL-11923"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc"},{"name":"[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"},{"name":"[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"}]}]},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2017-12633","datePublished":"2017-11-15T15:00:00.000Z","dateReserved":"2017-08-07T00:00:00.000Z","dateUpdated":"2024-09-16T22:25:45.252Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}