Skip to content

Deserialization of Untrusted Data in Apache Camel CassandraQL

High severity GitHub Reviewed Published Feb 20, 2024 to the GitHub Advisory Database • Updated Mar 2, 2024

Package

maven org.apache.camel:camel-cassandraql (Maven)

Affected versions

>= 3.0.0, < 3.21.4
>= 3.22.0, < 3.22.1
>= 4.0.0, < 4.0.4
>= 4.1.0, < 4.4.0

Patched versions

3.21.4
3.22.1
4.0.4
4.4.0

Description

Deserialization of Untrusted Data vulnerability in Apache Camel CassandraQL Component AggregationRepository which is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload.This issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.

Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1

References

Published by the National Vulnerability Database Feb 20, 2024
Published to the GitHub Advisory Database Feb 20, 2024
Reviewed Feb 21, 2024
Last updated Mar 2, 2024

Severity

High

EPSS score

0.043%
(10th percentile)

Weaknesses

CVE ID

CVE-2024-23114

GHSA ID

GHSA-m43p-55rf-8c2j

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.