Vulnerability Name:

CVE-2019-0194 (CCN-160305)

Assigned:2018-11-14
Published:2019-04-30
Updated:2019-05-24
Summary:Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-22
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-0194

Source: MLIST
Type: Exploit, Mailing List, Third Party Advisory
[oss-security] 20190430 [SECURITY] New security advisory CVE-2019-0194 released for Apache Camel

Source: BID
Type: UNKNOWN
108181

Source: XF
Type: UNKNOWN
apache-camel-cve20190194-dir-trav(160305)

Source: CCN
Type: CAMEL-13042
camel-core - File producer should by default not allow writing files to directories outside its starting directory

Source: MLIST
Type: Exploit, Mailing List, Vendor Advisory
[camel-users] 20190430 [SECURITY] New security advisory CVE-2019-0194 released for Apache Camel

Source: MLIST
Type: UNKNOWN
[camel-commits] 20190524 [camel] branch master updated: Added security advisory for CVE-2019-0188

Source: MLIST
Type: UNKNOWN
[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html

Source: MLIST
Type: Exploit, Mailing List, Patch, Vendor Advisory
[camel-commits] 20190430 [camel] branch master updated: Added CVE-2019-0194 details

Source: MLIST
Type: UNKNOWN
[camel-commits] 20190524 [camel] 02/02: CVE-2019-0188 - Changed the title in security advisories

Source: MISC
Type: Exploit, Mailing List, Vendor Advisory
https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E

Source: MLIST
Type: Exploit, Mailing List, Vendor Advisory
[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html

Source: CCN
Type: oss-sec Mailing List, Tue, 30 Apr 2019 10:38:34 +0000 (UTC)
[SECURITY] New security advisory CVE-2019-0194 released for Apache Camel

Source: CCN
Type: IBM Security Bulletin 1103301 (Tivoli Netcool Impact)
IBM Tivoli Netcool Impact is affected by an Apache Camel vulnerability (CVE-2019-0194)

Source: CCN
Type: IBM Security Bulletin 3011649 (Resilient)
Resilient is vulnerable to Using Components with Known Vulnerabilities

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-0194

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:camel:*:*:*:*:*:*:*:* (Version >= 2.0.0 and <= 2.19.0)
  • OR cpe:/a:apache:camel:*:*:*:*:*:*:*:* (Version >= 2.21.0 and <= 2.21.3)
  • OR cpe:/a:apache:camel:*:*:*:*:*:*:*:* (Version >= 2.22.0 and <= 2.22.2)
  • OR cpe:/a:apache:camel:2.23.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:camel:2.21.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:camel:2.20.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:camel:2.20.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:camel:2.20.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:camel:2.21.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:camel:2.22.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:camel:2.23.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:tivoli_netcool/impact:7.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/impact:7.1.0.16:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apache camel *
    apache camel *
    apache camel *
    apache camel 2.23.0
    apache camel 2.21.0
    apache camel 2.20.1
    apache camel 2.20.2
    apache camel 2.20.3
    apache camel 2.21.1
    apache camel 2.22.0
    apache camel 2.23.0
    ibm tivoli netcool/impact 7.1.0.0
    ibm tivoli netcool/impact 7.1.0.16