Apache Camel 消息头注入漏洞通过不当过滤
Apache Camel存在绕过过滤机制的注入漏洞(CVE-2025-27636),影响多个版本(如4.10.0至4.10.1、4.8.0至4.8.4、3.10.0至3.22.3)。攻击者通过改变字母大小写绕过默认过滤机制,注入恶意头信息以调用Bean注册表中的任意方法或使用表达式语言。建议升级至安全版本或移除危险头信息修复问题。 2025-3-9 14:52:0 Author: seclists.org(查看原文) 阅读量:20 收藏

oss-sec logo

oss-sec mailing list archives


From: Andrea Cosentino <acosentino () apache org>
Date: Sun, 09 Mar 2025 10:40:03 +0000

Severity: moderate

Affected versions:

- Apache Camel 4.10.0 before 4.10.2
- Apache Camel 4.8.0 before 4.8.5
- Apache Camel 3.10.0 before 3.22.4

Description:

Bypass/Injection vulnerability in Apache Camel.

This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 
3.22.3.

Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.

The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with 
"Camel", "camel", or "org.apache.camel.". Attackers can bypass this filter by altering the casing of letters. This 
allows attackers to inject headers which can be exploited to invoke arbitrary methods from the Bean registry and also 
supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean. 
It's important to note that only methods in the same bean declared in the bean URI could be invoked.


Mitigation: You can easily work around this in your Camel applications by removing the headers in your Camel routes. 
There are many ways of doing this, also globally or per route. This means you could use the removeHeaders EIP, to 
filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with "Camel", "camel" or 
"org.apache.camel.".

This issue is being tracked as CAMEL-21838 

Credit:

Mark Thorson (finder)

References:

https://camel.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-27636
https://issues.apache.org/jira/browse/CAMEL-21838


Current thread:

  • CVE-2025-27636: Apache Camel: Camel Message Header Injection via Improper Filtering Andrea Cosentino (Mar 09)

文章来源: https://seclists.org/oss-sec/2025/q1/192
如有侵权请联系:admin#unsafe.sh