9.5 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.011 Low
EPSS
Percentile
84.7%
Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including “$simple{}” in a CamelFileName message header to a (1) FILE or (2) FTP producer.
camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943
osvdb.org/97941
packetstormsecurity.com/files/123454/
rhn.redhat.com/errata/RHSA-2013-1862.html
rhn.redhat.com/errata/RHSA-2014-0124.html
rhn.redhat.com/errata/RHSA-2014-0140.html
rhn.redhat.com/errata/RHSA-2014-0245.html
rhn.redhat.com/errata/RHSA-2014-0254.html
seclists.org/fulldisclosure/2013/Sep/178
secunia.com/advisories/54888
exchange.xforce.ibmcloud.com/vulnerabilities/87542
lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E