CVE-2016-8749

Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks.
References
Link Resource
http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2 Vendor Advisory
http://www.openwall.com/lists/oss-security/2017/05/22/2 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/97179 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1832 Third Party Advisory
https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E
https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true Exploit Technical Description Third Party Advisory
http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2 Vendor Advisory
http://www.openwall.com/lists/oss-security/2017/05/22/2 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/97179 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1832 Third Party Advisory
https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E
https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:camel:2.16.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.16.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.16.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.16.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.16.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2 - Vendor Advisory () http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2017/05/22/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/05/22/2 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/97179 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97179 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:1832 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1832 - Third Party Advisory
References () https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E - () https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E -
References () https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E - () https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E -
References () https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true - Exploit, Technical Description, Third Party Advisory () https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true - Exploit, Technical Description, Third Party Advisory

07 Nov 2023, 02:36

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'name': '[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'name': '[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E -
  • () https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E -

Information

Published : 2017-03-28 18:59

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8749

Mitre link : CVE-2016-8749

CVE.ORG link : CVE-2016-8749


JSON object : View

Products Affected

apache

  • camel
CWE
CWE-502

Deserialization of Untrusted Data