CVE-2013-4330

Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including "$simple{}" in a CamelFileName message header to a (1) FILE or (2) FTP producer.
References
Link Resource
http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943 Vendor Advisory
http://osvdb.org/97941
http://packetstormsecurity.com/files/123454/
http://rhn.redhat.com/errata/RHSA-2013-1862.html
http://rhn.redhat.com/errata/RHSA-2014-0124.html
http://rhn.redhat.com/errata/RHSA-2014-0140.html
http://rhn.redhat.com/errata/RHSA-2014-0245.html
http://rhn.redhat.com/errata/RHSA-2014-0254.html
http://seclists.org/fulldisclosure/2013/Sep/178
http://secunia.com/advisories/54888 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/87542
https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E
http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943 Vendor Advisory
http://osvdb.org/97941
http://packetstormsecurity.com/files/123454/
http://rhn.redhat.com/errata/RHSA-2013-1862.html
http://rhn.redhat.com/errata/RHSA-2014-0124.html
http://rhn.redhat.com/errata/RHSA-2014-0140.html
http://rhn.redhat.com/errata/RHSA-2014-0245.html
http://rhn.redhat.com/errata/RHSA-2014-0254.html
http://seclists.org/fulldisclosure/2013/Sep/178
http://secunia.com/advisories/54888 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/87542
https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.0.0:milestone2:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.0.0:milestone3:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.9.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.9.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.9.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.10.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.10.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.10.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.10.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.10.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943 - Vendor Advisory () http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943 - Vendor Advisory
References () http://osvdb.org/97941 - () http://osvdb.org/97941 -
References () http://packetstormsecurity.com/files/123454/ - () http://packetstormsecurity.com/files/123454/ -
References () http://rhn.redhat.com/errata/RHSA-2013-1862.html - () http://rhn.redhat.com/errata/RHSA-2013-1862.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0124.html - () http://rhn.redhat.com/errata/RHSA-2014-0124.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0140.html - () http://rhn.redhat.com/errata/RHSA-2014-0140.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0245.html - () http://rhn.redhat.com/errata/RHSA-2014-0245.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0254.html - () http://rhn.redhat.com/errata/RHSA-2014-0254.html -
References () http://seclists.org/fulldisclosure/2013/Sep/178 - () http://seclists.org/fulldisclosure/2013/Sep/178 -
References () http://secunia.com/advisories/54888 - Vendor Advisory () http://secunia.com/advisories/54888 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/87542 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/87542 -
References () https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E - () https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E -
References () https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E - () https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E -

Information

Published : 2013-10-04 17:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4330

Mitre link : CVE-2013-4330

CVE.ORG link : CVE-2013-4330


JSON object : View

Products Affected

apache

  • camel
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')