content/security/CVE-2025-30177.txt.asc (29 lines of code) (raw):
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- ---
title: "Apache Camel Security Advisory - CVE-2025-30177"
date: 2025-04-01T07:30:42+02:00
url: /security/CVE-2025-30177.html
draft: false
type: security-advisory
cve: CVE-2025-30177
severity: MEDIUM
summary: "Camel-Undertow Message Header Injection via Improper Filtering"
description: "Camel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the 'out' direction, while it doesn't filter the 'in' direction.This allows an attacker to include Camel specific headers that for some Camel components can alter the behaviours such as the camel-bean component, or the camel-exec component."
mitigation: "Users are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS."
credit: "This issue was discovered and reported by Mark Thorson of AT&T."
affected: Apache Camel 4.10.0 before 4.10.3. Apache Camel 4.8.0 before 4.8.6.
fixed: 4.8.6 and 4.10.3
- ---
The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-21876 refers to the commit that resolved the issue, and have more details.
This CVE is related to the CVE-2025-27636 and CVE-2025-29891.
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfr8ZgACgkQ406fOAL/
QQBlIAgAnorU4rFwZ/2NWGzjnWLXCayA9sH/AfRpRuiU5ClJaavLoiK3urCocGpG
dnouuSX79zKatbWqhjU3x1WmZGIWb6KJAlXXci7ptT+bhvjBK4Xi4+mduheAKYY9
iS/lDTkmq7aTLnKu74hDeGw+9bKb7Uvz2waoHRoKMyIURWkEuM+olzFCxIZD2SZG
ztVB1sFXLUW89zXQxY5/pRoRVgpScu+EI0PTm0ssQ1fRpundPILbi31CrFeHG9BR
EDg/A/4j6jaBGvORx0r0bsTVDCyxkXriGx08hvYaYbEBnM+twIL2A/OhhtVcPTnJ
vTD1RPwVXMi9dYE9CvKyL3vGqLS+4w==
=LOCx
-----END PGP SIGNATURE-----