-
Notifications
You must be signed in to change notification settings - Fork 170
/
CVE-2024-22371.txt.asc
32 lines (28 loc) · 1.65 KB
/
CVE-2024-22371.txt.asc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- ---
title: "Apache Camel Security Advisory - CVE-2024-22371"
date: 2024-02-19T10:41:48+02:00
url: /security/CVE-2024-22371.html
draft: false
type: security-advisory
cve: CVE-2024-22371
severity: LOW
summary: "Exposure of sensitive data by by crafting a malicious EventFactory and providing a custom ExchangeCreatedEvent that exposes sensitive data"
description: "The EventFactory class is vulnerable to temporary file information disclosure. Under specific conditions, it is possible to expose sensitive data"
mitigation: "Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1"
credit: "This issue was discovered by Otavio Rodolfo Piske from Apache Software Foundation"
affected: From 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0
fixed: 3.21.4, 3.22.1, 4.0.4 and 4.4.0
- ---
The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-20305 refers to the various commits that resolved the issue, and have more details.
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEznCKplWLmW/2ohjPfuCokuDG8qAFAmXTYjQACgkQfuCokuDG
8qB/PQf8Cj13yOKC+3BaTSJp7PS0m8S2ePyjWVRjzfBZnwrrxRjXsNiCuahLW98m
CbMJ5sL7A5DJAQyZNE4yQQYGVr+B2YTqe5THbwemx1GDiEk62NLIMIv0XHmvUUEX
ehIWa0XFUUkZ4DhRAkATzPsjn23znf9dC+7Vcq9cjFjHpshnF9llGdmMaI/8FSoz
jrhsHyDNOgLy1A8RIX9Or8EMb4yrZLByTjq0OEK/pP3O4NlSBHNz+6GDVBi5OC32
UqFrFYG6ts20jO7CE7pnXBtLOM9xpJZ2+a4Xe69ISf4YFMt1pvZIiZVpto+hFsFb
m5QHWJah0l8jD9IyXqbCC6lVlPP/sA==
=XmAO
-----END PGP SIGNATURE-----