4.11.0
6 years ago
17 days ago
Known vulnerabilities in the org.apache.camel:camel-support package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Handling of Case Sensitivity due to a flaw in the header filtering mechanism that only blocks headers starting with specific prefixes, and may be manipulated to treat parameter values as headers. If an application accepts HTTP requests directly from the internet, an attacker can invoke arbitrary methods from the Bean registry or use expressions as part of the method parameters, leading to unauthorized actions. Notes: This is only exploitable if the user is using one of the following HTTP Servers via one the of the following Camel components:
The interaction between the dependencies described above is the necessary precondition to be vulnerable, but This vulnerability achieves the same effect as the one described in CVE-2025-27636. The present vulnerability's vector involves the translation of HTTP parameters into malicious headers and was therefore not explicitly addressed in the previous formulation and publication. How to fix Improper Handling of Case Sensitivity? Upgrade | [3.10.0,3.22.4)[4.8.0,4.8.5)[4.10.0,4.10.2) |
Affected versions of this package are vulnerable to Improper Handling of Case Sensitivity due to a flaw in the default filtering mechanism that only blocks headers starting with specific prefixes. An attacker can manipulate header entries to invoke arbitrary methods from the Bean registry or use expressions as part of the method parameters, leading to unauthorized actions. Notes: This is only exploitable if the user is using one of the following HTTP Servers via one the of the following Camel components:
The interaction between the dependencies described above is the necessary precondition to be vulnerable, but How to fix Improper Handling of Case Sensitivity? Upgrade | [3.10.0,3.22.4)[4.8.0,4.8.5)[4.10.0,4.10.2) |