CVE-2013-4330
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
04/10/2013
Last modified:
11/04/2025
Description
Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including "$simple{}" in a CamelFileName message header to a (1) FILE or (2) FTP producer.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:* | 2.9.6 (including) | |
| cpe:2.3:a:apache:camel:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:1.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:2.0.0:milestone1:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:camel:2.0.0:milestone2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943
- http://osvdb.org/97941
- http://packetstormsecurity.com/files/123454/
- http://rhn.redhat.com/errata/RHSA-2013-1862.html
- http://rhn.redhat.com/errata/RHSA-2014-0124.html
- http://rhn.redhat.com/errata/RHSA-2014-0140.html
- http://rhn.redhat.com/errata/RHSA-2014-0245.html
- http://rhn.redhat.com/errata/RHSA-2014-0254.html
- http://seclists.org/fulldisclosure/2013/Sep/178
- http://secunia.com/advisories/54888
- https://exchange.xforce.ibmcloud.com/vulnerabilities/87542
- https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
- https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E
- http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943
- http://osvdb.org/97941
- http://packetstormsecurity.com/files/123454/
- http://rhn.redhat.com/errata/RHSA-2013-1862.html
- http://rhn.redhat.com/errata/RHSA-2014-0124.html
- http://rhn.redhat.com/errata/RHSA-2014-0140.html
- http://rhn.redhat.com/errata/RHSA-2014-0245.html
- http://rhn.redhat.com/errata/RHSA-2014-0254.html
- http://seclists.org/fulldisclosure/2013/Sep/178
- http://secunia.com/advisories/54888
- https://exchange.xforce.ibmcloud.com/vulnerabilities/87542
- https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E
- https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E



