You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@camel.apache.org by ac...@apache.org on 2024/02/19 08:27:51 UTC

(camel-website) 01/01: Release CVE-2024-22369 details

This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch CVE-2024-22369
in repository https://gitbox.apache.org/repos/asf/camel-website.git

commit 869915548783ccdce2fb22fa0d0a76dc492726ac
Author: Andrea Cosentino <an...@gmail.com>
AuthorDate: Mon Feb 19 09:27:24 2024 +0100

    Release CVE-2024-22369 details
    
    Signed-off-by: Andrea Cosentino <an...@gmail.com>
---
 content/security/CVE-2024-22369.md      | 18 ++++++++++++++++++
 content/security/CVE-2024-22369.txt.asc | 28 ++++++++++++++++++++++++++++
 2 files changed, 46 insertions(+)

diff --git a/content/security/CVE-2024-22369.md b/content/security/CVE-2024-22369.md
new file mode 100644
index 00000000..9c040861
--- /dev/null
+++ b/content/security/CVE-2024-22369.md
@@ -0,0 +1,18 @@
+---
+title: "Apache Camel Security Advisory - CVE-2024-22369"
+date: 2024-02-19T11:15:42+02:00
+url: /security/CVE-2024-22369.html
+draft: false
+type: security-advisory
+cve: CVE-2024-22369
+severity: HIGH
+summary: "Apache Camel: Camel-SQL: Unsafe Deserialization from JDBCAggregationRepository"
+description: "The Camel-SQL AggregationRepository is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload."
+mitigation: "Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1"
+credit: "This issue was discovered by Ziyang Chen from HuaWei Open Source Management Center, Pingtao Wei from HuaWei Open Source Management Center (finder) and Haoran Zhi from HuaWei Open Source Management Center"
+affected: From 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.
+fixed: 3.21.4, 3.22.1, 4.0.4 and 4.4.0
+---
+
+The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-20303 refers to the various commits that resovoled the issue, and have more details.
+
diff --git a/content/security/CVE-2024-22369.txt.asc b/content/security/CVE-2024-22369.txt.asc
new file mode 100644
index 00000000..5ec3e0a1
--- /dev/null
+++ b/content/security/CVE-2024-22369.txt.asc
@@ -0,0 +1,28 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA256
+
+CVE-2024-22369: Apache Camel: Camel-SQL: Unsafe Deserialization from JDBCAggregationRepository
+
+Severity: HIGH
+
+Vendor: The Apache Software Foundation
+
+Versions Affected: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.
+
+Description: The Camel-SQL AggregationRepository is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload.
+
+Mitigation: Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1
+
+Credit: This issue was discovered by Ziyang Chen from HuaWei Open Source Management Center, Pingtao Wei from HuaWei Open Source Management Center (finder) and Haoran Zhi from HuaWei Open Source Management Center
+
+-----BEGIN PGP SIGNATURE-----
+
+iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmXPUJ8ACgkQ406fOAL/
+QQCy5Af9ENgkrsI710MJHmlB03gYEGxqtyewSX6shfSS1EZCjil8ixyGI4LcER/D
+glE8AoRHwSgABhF4fuaXsl7m2n2S9x7eA0cor9c6xQAld5cm8BZjWq7eATKvXvYP
++yKZrjgDdo4jmLhhbuuraiDWPr/z20cUWrwqMHVAGXk3kGu4zqQ8eChAxNiYdW/X
+2HcmN/mprIirH8j/O6vcJP+fy5gkydVmF1U98L+7i0fs2Zd/6hlZGEpwVaOVz4P/
+6s8bfEmTMJVTsmqq5GbrGiufApXzAfWHJMRYONYA/6XBJb91kYyLe+GjIVUJd/g+
+ru6XHIfS9htOc2adVD50S/fCIWrjXg==
+=50B9
+-----END PGP SIGNATURE-----