Bypass/Injection vulnerability in Apache Camel-Bean component under particular conditions.
This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3.
Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.
This vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components
* camel-servlet
* camel-jetty
* camel-undertow
* camel-platform-http
* camel-netty-http
and in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular:
* The bean invocation (is only affected if you use any of the above together with camel-bean component).
* The bean that can be called, has more than 1 method implemented.
In these conditions an attacker could be able to forge a Camel header name and make the bean component invoking other methods in the same bean.
The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.".
Mitigation: You can easily work around this in your Camel applications by removing the headers in your Camel routes. There are many ways of doing this, also globally or per route. This means you could use the removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with "Camel", "camel" or "org.apache.camel.".
Metrics
Affected Vendors & Products
References
History
Tue, 11 Mar 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-644 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 10 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-178 | |
References |
| |
Metrics |
cvssV3_1
|
Mon, 10 Mar 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sun, 09 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sun, 09 Mar 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sun, 09 Mar 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Bypass/Injection vulnerability in Apache Camel. This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3. Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.". Attackers can bypass this filter by altering the casing of letters. This allows attackers to inject headers which can be exploited to invoke arbitrary methods from the Bean registry and also supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean. It's important to note that only methods in the same bean declared in the bean URI could be invoked. Mitigation: You can easily work around this in your Camel applications by removing the headers in your Camel routes. There are many ways of doing this, also globally or per route. This means you could use the removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with "Camel", "camel" or "org.apache.camel.". | Bypass/Injection vulnerability in Apache Camel-Bean component under particular conditions. This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3. Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. This vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components * camel-servlet * camel-jetty * camel-undertow * camel-platform-http * camel-netty-http and in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular: * The bean invocation (is only affected if you use any of the above together with camel-bean component). * The bean that can be called, has more than 1 method implemented. In these conditions an attacker could be able to forge a Camel header name and make the bean component invoking other methods in the same bean. The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.". Mitigation: You can easily work around this in your Camel applications by removing the headers in your Camel routes. There are many ways of doing this, also globally or per route. This means you could use the removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with "Camel", "camel" or "org.apache.camel.". |
Title | Apache Camel: Camel Message Header Injection via Improper Filtering | Apache Camel: Bean component: Camel Message Header Injection via Improper Filtering |
Sun, 09 Mar 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Bypass/Injection vulnerability in Apache Camel. This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3. Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.". Attackers can bypass this filter by altering the casing of letters. This allows attackers to inject headers which can be exploited to invoke arbitrary methods from the Bean registry and also supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean. It's important to note that only methods in the same bean declared in the bean URI could be invoked. Mitigation: You can easily work around this in your Camel applications by removing the headers in your Camel routes. There are many ways of doing this, also globally or per route. This means you could use the removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with "Camel", "camel" or "org.apache.camel.". | |
Title | Apache Camel: Camel Message Header Injection via Improper Filtering | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-03-09T12:09:58.619Z
Updated: 2025-03-10T18:56:43.452Z
Reserved: 2025-03-04T11:56:29.254Z
Link: CVE-2025-27636

Updated: 2025-03-10T18:51:42.884Z

Status : Awaiting Analysis
Published: 2025-03-09T13:15:34.403
Modified: 2025-03-10T19:15:41.240
Link: CVE-2025-27636
