Skip to content

Latest commit

 

History

History
26 lines (22 loc) · 1.54 KB

CVE-2014-0002.md

File metadata and controls

26 lines (22 loc) · 1.54 KB
title url date draft cve severity summary description mitigation credit type affected fixed
Apache Camel Security Advisory - CVE-2014-0002
/security/CVE-2014-0002.html
2014-03-20 17:38:59 -0700
false
CVE-2014-0002
CRITICAL
The Apache Camel XSLT component will resolve entities in XML messages when transforming them using an xslt route.
The Apache Camel XSLT component will resolve entities in XML messages when transforming them using an xslt route. A remote attacker able to submit messages to an xslt route could use this flaw to read files accessible to the running application server and potentially perform other more advanced XXE attacks.
2.11.x users should upgrade to 2.11.4, 2.12.x users should upgrade to 2.12.3. This patch will be included from Camel 2.13.0: https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=341d4e6cca71c53c90962d1c3d45fc9e05cc50c6
This issue was discovered by David Jorm.
security-advisory
2.11.0 up to 2.11.3, 2.12.0 up to 2.12.2
2.11.4, 2.12.3, 2.13.0 and newer

Example: Create a simple route which receives an HTTP request, apply a (safe) stylesheet and store the result in a file:

<route>
  <from uri="servlet:///hello"/>
  <to uri="xslt:file:/tmp/transform.xsl" />
  <to uri="file:/tmp/output" />
</route>

If an attacker is able to submit a message to this route, they can provide a message that is an XML document containing external entities. These entities will be resolved, and their contents included in the output of the transformation performed by the xslt route.