-
CVSS Score
-The vulnerability stems from improper case handling in Camel's header filtering mechanism. Analysis of the commit diff shows modifications to DefaultHeaderFilterStrategy that added lowercase checks in tryPattern and evalFilterMatch. The original implementation only checked exact case matches for Camel-specific headers (Camel/camel/org.apache.camel), allowing attackers to bypass filters using mixed-case headers. The vulnerable functions are directly responsible for header filtering decisions in HTTP components, and their flawed case sensitivity handling enabled the injection vector when combined with camel-bean components that process unfiltered headers.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.camel:camel-support | maven | >= 3.10.0, < 3.22.4 | 3.22.4 |
| org.apache.camel:camel-support | maven | >= 4.9.0, < 4.10.2 | 4.10.2 |
| org.apache.camel:camel-support | maven | >= 4.0.0-M1, < 4.8.5 | 4.8.5 |