cve/2020/CVE-2020-11972.md

21 lines
913 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-11972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11972)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Camel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Java%20deserialization&color=brighgreen)
### Description
Apache Camel RabbitMQ enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpujan2021.html
2024-05-25 21:48:12 +02:00
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs