Author: buildbot
Date: Tue Apr 30 11:19:41 2019
New Revision: 1044347
Log:
Production update by buildbot for camel
Added:
websites/production/camel/content/security-advisories.data/CVE-2019-0194.txt.asc
Modified:
websites/production/camel/content/cache/main.pageCache
websites/production/camel/content/security-advisories.html
Modified: websites/production/camel/content/cache/main.pageCache
==============================================================================
Binary files - no diff available.
Added:
websites/production/camel/content/security-advisories.data/CVE-2019-0194.txt.asc
==============================================================================
---
websites/production/camel/content/security-advisories.data/CVE-2019-0194.txt.asc
(added)
+++
websites/production/camel/content/security-advisories.data/CVE-2019-0194.txt.asc
Tue Apr 30 11:19:41 2019
@@ -0,0 +1,27 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
+CVE-2019-0194: Apache Camel's File is vulnerable to directory traversal
+
+Severity: MEDIUM
+
+Vendor: The Apache Software Foundation
+
+Versions Affected: Camel 2.21.0 to 2.21.3, Camel 2.22.0 to 2.22.2 and Camel
2.23.0 The unsupported Camel 2.x (2.19 and earlier) versions may be also
affected.
+
+Description: Apache Camel's File is vulnerable to directory traversal
+
+Mitigation: 2.21.x users should upgrade to 2.21.5, 2.22.x users should upgrade
to 2.22.3 and Camel 2.23.x users should upgrade to 2.23.1 The JIRA tickets:
https://issues.apache.org/jira/browse/CAMEL-13042 refers to the various commits
that resovoled the issue, and have more details.
+
+Credit: This issue was discovered by Colm O. HEigeartaigh <coheigea at apache
dot org> from Apache Software Foundation
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.22 (GNU/Linux)
+
+iQEcBAEBAgAGBQJcyCQMAAoJEONOnzgC/0EAoi4H/iqigma2trual75FfCiiJuRz
+HEwjmJ+/aqWwGo5sBY53aDpD2OtCNylmCoRGDEgP3ToAv+WyEgfSXJYPjRJGT1wo
++8DLiHe3m5Z/tJk9sscYPn5s9/4bd+gES16hBWNtTpF/yryvMMS9jgGWglgVHAD3
+wP9AyWV1HVbuf7axW/Q9SS/Tw0pgBfKTVuQrZBmMNpcO/0YTGQR3uIbr8KGpwq3P
+asNvlUgCub3osq4qM5OsjQTvtkGYQfHmnuotavKXuRZbBW18KxCaqcKQPUjOOedG
+SZ5aOhwNLCcXZ4A550FB6QJxAwRG/8SXzwXS90MT5WwFgfJKE3dzRAH2PWEIaxo=
+=u2h4
+-----END PGP SIGNATURE-----
Modified: websites/production/camel/content/security-advisories.html
==============================================================================
--- websites/production/camel/content/security-advisories.html (original)
+++ websites/production/camel/content/security-advisories.html Tue Apr 30
11:19:41 2019
@@ -78,21 +78,13 @@
<tbody>
<tr>
<td valign="top" width="100%">
-<div class="wiki-content maincontent"><h3
id="SecurityAdvisories-2018">2018</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2"
data-linked-resource-id="91554396" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8041.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2018-8041</a><a shape="rect"
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&modificationDate=1533020841000&api=v2"
data-linked-resource-id="89065844" data-linked-resource-version="4"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933" data-linked-resource-conta
iner-version="19"> </a>- Apache Camel's Mail is vulnerable to path
traversal</li><li><a shape="rect"
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&modificationDate=1533020841000&api=v2"
data-linked-resource-id="89065844" data-linked-resource-version="4"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2018-8027</a><a shape="rect"
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&modificationDate=1533020841000&api=v2"
data-linked-resource-id="89065844" data-linked-resource-version="4"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933" data-linked-resourc
e-container-version="19"> </a>- Apache Camel's Core is vulnerable to
XXE in XSD validation processor</li></ul><h3
id="SecurityAdvisories-2017">2017</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2017-12634.txt.asc?version=1&modificationDate=1510733922000&api=v2"
data-linked-resource-id="74687198" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-12634.txt.asc"
data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2017-12634</a> - Apache
Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution
attacks</li><li><a shape="rect"
href="security-advisories.data/CVE-2017-12633.txt.asc?version=1&modificationDate=1510733921000&api=v2"
data-linked-resource-id="74687197" data-linked-resource-version="1"
data-linked-resource-type="attachment" data-link
ed-resource-default-alias="CVE-2017-12633.txt.asc" data-nice-type="Text File"
data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2017-12633</a> - Apache
Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution
attacks</li><li><a shape="rect"
href="security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2"
data-linked-resource-id="68719271" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-5643.txt.asc"
data-linked-resource-content-type="application/pgp-encrypted"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2017-5643</a> - Apache
Camel's Validation Component is vulnerable against SSRF via remote DTDs and
XXE</li><li><a shape="rect"
href="security-advisories.data/CVE-2017-3159.txt.asc?version=1&modi
ficationDate=1486565167000&api=v2" data-linked-resource-id="67641933"
data-linked-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-3159.txt.asc"
data-linked-resource-content-type="application/pgp-encrypted"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2017-3159</a> - Apache
Camel's Snakeyaml unmarshalling operation is vulnerable to Remote Code
Execution attacks</li></ul><h3 id="SecurityAdvisories-2016">2016</h3><ul><li><a
shape="rect"
href="security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2"
data-linked-resource-id="67641927" data-linked-resource-version="2"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2016-8749.txt.asc"
data-linked-resource-content-type="application/pgp-encrypted"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2016-8749
</a> - Apache Camel's Jackson and JacksonXML unmarshalling operation
are vulnerable to Remote Code Execution attacks</li></ul><h3
id="SecurityAdvisories-2015">2015</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2015-5344.txt.asc?version=1&modificationDate=1454056803000&api=v2"
data-linked-resource-id="61338184" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-5344.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2015-5344</a> - Apache
Camel's XStream usage is vulnerable to Remote Code Execution
attacks.</li><li><a shape="rect"
href="security-advisories.data/CVE-2015-5348.txt.asc?version=1&modificationDate=1450340845000&api=v2"
data-linked-resource-id="61333112" data-linked-resource-version="1"
data-linked-resource-type="attachment" dat
a-linked-resource-default-alias="CVE-2015-5348.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2015-5348</a> - Apache Camel's
Jetty/Servlet usage is vulnerable to Java object de-serialisation
vulnerability.</li><li><a shape="rect"
href="security-advisories.data/CVE-2015-0264.txt.asc?version=1&modificationDate=1426539191000&api=v2"
data-linked-resource-id="54165590" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-0264.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2015-0264</a> - The XPath
handling in Apache Camel for invalid XML Strings or invalid XML GenericFile
objects allows remote attackers to read arbitrary files via an XML External
Entity (XXE) decl
aration. The XML External Entity (XXE) will be resolved before the Exception
is thrown.</li><li><a shape="rect"
href="security-advisories.data/CVE-2015-0263.txt.asc?version=1&modificationDate=1426539178000&api=v2"
data-linked-resource-id="54165589" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-0263.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2015-0263</a> - The XML
converter setup in Apache Camel allows remote attackers to read arbitrary files
via an SAXSource containing an XML External Entity (XXE)
declaration.</li></ul><h3 id="SecurityAdvisories-2014">2014</h3><ul><li><a
shape="rect"
href="security-advisories.data/CVE-2014-0003.txt.asc?version=1&modificationDate=1393615582000&api=v2"
data-linked-resource-id="40009835" data-linked-resource-version="1"
data-linked-res
ource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0003.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2014-0003</a> - The Apache
Camel XSLT component allows XSL stylesheets to perform calls to external Java
methods.</li><li><a shape="rect"
href="security-advisories.data/CVE-2014-0002.txt.asc?version=1&modificationDate=1393615569000&api=v2"
data-linked-resource-id="40009834" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0002.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2014-0002</a> - The Apache
Camel XSLT component will resolve entities in XML messages when transforming
them using an xslt route.</li></ul><h3 id="SecurityAdvisories-
2013">2013</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380633919000&api=v2"
data-linked-resource-id="35192841" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2013-4330.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="19">CVE-2013-4330</a> - Writing files
using FILE or FTP components, can potentially be exploited by a malicious
user.</li></ul><p> </p></div>
+<div class="wiki-content maincontent"><h3
id="SecurityAdvisories-2019">2019</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2019-0194.txt.asc?version=1&modificationDate=1556620345303&api=v2"
data-linked-resource-id="113708792" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2019-0194.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2019-0194</a><a shape="rect"
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&modificationDate=1533020841000&api=v2"
data-linked-resource-id="89065844" data-linked-resource-version="4"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933" data-linked-resource-cont
ainer-version="20"> </a>- Apache Camel's File is vulnerable to
directory traversal</li></ul><h3
id="SecurityAdvisories-2018">2018</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2"
data-linked-resource-id="91554396" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8041.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2018-8041</a><a shape="rect"
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&modificationDate=1533020841000&api=v2"
data-linked-resource-id="89065844" data-linked-resource-version="4"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain" data-li
nked-resource-container-id="34833933"
data-linked-resource-container-version="20"> </a>- Apache Camel's
Mail is vulnerable to path traversal</li><li><a shape="rect"
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&modificationDate=1533020841000&api=v2"
data-linked-resource-id="89065844" data-linked-resource-version="4"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2018-8027</a><a shape="rect"
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&modificationDate=1533020841000&api=v2"
data-linked-resource-id="89065844" data-linked-resource-version="4"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20"> </a>- Apache Camel's
Core is vulnerable to XXE in XSD validation processor</li></ul><h3
id="SecurityAdvisories-2017">2017</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2017-12634.txt.asc?version=1&modificationDate=1510733922000&api=v2"
data-linked-resource-id="74687198" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-12634.txt.asc"
data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2017-12634</a> - Apache
Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution
attacks</li><li><a shape="rect"
href="security-advisories.data/CVE-2017-12633.txt.asc?version=1&modificationDate=1510733921000&api=v2"
data-linked-resource-id="74687197" data-linked-resou
rce-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-12633.txt.asc"
data-nice-type="Text File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2017-12633</a> - Apache
Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution
attacks</li><li><a shape="rect"
href="security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2"
data-linked-resource-id="68719271" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-5643.txt.asc"
data-linked-resource-content-type="application/pgp-encrypted"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2017-5643</a> - Apache
Camel's Validation Component is vulnerable against SSRF via remote DTDs and
XXE</li><li><a shape="rect" href="s
ecurity-advisories.data/CVE-2017-3159.txt.asc?version=1&modificationDate=1486565167000&api=v2"
data-linked-resource-id="67641933" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2017-3159.txt.asc"
data-linked-resource-content-type="application/pgp-encrypted"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2017-3159</a> - Apache
Camel's Snakeyaml unmarshalling operation is vulnerable to Remote Code
Execution attacks</li></ul><h3 id="SecurityAdvisories-2016">2016</h3><ul><li><a
shape="rect"
href="security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2"
data-linked-resource-id="67641927" data-linked-resource-version="2"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2016-8749.txt.asc"
data-linked-resource-content-type="application/pgp-encrypted"
data-linked-resource-container-id="348
33933"
data-linked-resource-container-version="20">CVE-2016-8749</a> - Apache
Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to
Remote Code Execution attacks</li></ul><h3
id="SecurityAdvisories-2015">2015</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2015-5344.txt.asc?version=1&modificationDate=1454056803000&api=v2"
data-linked-resource-id="61338184" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-5344.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2015-5344</a> - Apache
Camel's XStream usage is vulnerable to Remote Code Execution
attacks.</li><li><a shape="rect"
href="security-advisories.data/CVE-2015-5348.txt.asc?version=1&modificationDate=1450340845000&api=v2"
data-linked-resource-id="61333112" data-linked
-resource-version="1" data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-5348.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2015-5348</a> - Apache Camel's
Jetty/Servlet usage is vulnerable to Java object de-serialisation
vulnerability.</li><li><a shape="rect"
href="security-advisories.data/CVE-2015-0264.txt.asc?version=1&modificationDate=1426539191000&api=v2"
data-linked-resource-id="54165590" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-0264.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2015-0264</a> - The XPath
handling in Apache Camel for invalid XML Strings or invalid XML GenericFile
objects allows remote attacke
rs to read arbitrary files via an XML External Entity (XXE) declaration. The
XML External Entity (XXE) will be resolved before the Exception is
thrown.</li><li><a shape="rect"
href="security-advisories.data/CVE-2015-0263.txt.asc?version=1&modificationDate=1426539178000&api=v2"
data-linked-resource-id="54165589" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2015-0263.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2015-0263</a> - The XML
converter setup in Apache Camel allows remote attackers to read arbitrary files
via an SAXSource containing an XML External Entity (XXE)
declaration.</li></ul><h3 id="SecurityAdvisories-2014">2014</h3><ul><li><a
shape="rect"
href="security-advisories.data/CVE-2014-0003.txt.asc?version=1&modificationDate=1393615582000&api=v2"
data-linked-resourc
e-id="40009835" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0003.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2014-0003</a> - The Apache
Camel XSLT component allows XSL stylesheets to perform calls to external Java
methods.</li><li><a shape="rect"
href="security-advisories.data/CVE-2014-0002.txt.asc?version=1&modificationDate=1393615569000&api=v2"
data-linked-resource-id="40009834" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2014-0002.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2014-0002</a> - The Apache
Camel XSLT component will resolve entities in XML messages when transformin
g them using an xslt route.</li></ul><h3
id="SecurityAdvisories-2013">2013</h3><ul><li><a shape="rect"
href="security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380633919000&api=v2"
data-linked-resource-id="35192841" data-linked-resource-version="1"
data-linked-resource-type="attachment"
data-linked-resource-default-alias="CVE-2013-4330.txt.asc" data-nice-type="Text
File" data-linked-resource-content-type="text/plain"
data-linked-resource-container-id="34833933"
data-linked-resource-container-version="20">CVE-2013-4330</a> - Writing files
using FILE or FTP components, can potentially be exploited by a malicious
user.</li></ul><p><br clear="none"></p></div>
</td>
<td valign="top">
<div class="navigation">
<div class="navigation_top">
<!-- NavigationBar -->
-<div class="navigation_bottom" id="navigation_bottom"><h3
id="Navigation-Overview"><a shape="rect"
href="overview.html">Overview</a></h3><ul class="alternate"><li><a shape="rect"
href="index.html">Home</a></li><li><a shape="rect"
href="download.html">Download</a></li><li><a shape="rect"
href="getting-started.html">Getting Started</a></li><li><a shape="rect"
href="faq.html">FAQ</a></li></ul><h3 id="Navigation-Documentation"><a
shape="rect" href="documentation.html">Documentation</a></h3><ul
class="alternate"><li><a shape="rect" href="user-guide.html">User
Guide</a></li><li><a shape="rect" href="manual.html">Manual</a></li><li><a
shape="rect" href="books.html">Books</a></li><li><a shape="rect"
href="tutorials.html">Tutorials</a></li><li><a shape="rect"
href="examples.html">Examples</a></li><li><a shape="rect"
href="cookbook.html">Cookbook</a></li><li><a shape="rect"
href="architecture.html">Architecture</a></li><li><a shape="rect"
href="enterprise-integration-patterns.html">Enterprise
Integration Patterns</a></li><li><a shape="rect"
href="dsl.html">DSL</a></li><li><a shape="rect"
href="components.html">Components</a></li><li><a shape="rect"
href="data-format.html">Data Format</a></li><li><a shape="rect"
href="languages.html">Languages</a></li><li><a shape="rect"
href="security.html">Security</a></li><li><a shape="rect"
href="security-advisories.html">Security Advisories</a></li></ul><h3
id="Navigation-Search">Search</h3><form
enctype="application/x-www-form-urlencoded" method="get" id="cse-search-box"
action="http://www.google.com/cse">
- <div>
- <input type="hidden" name="cx" value="007878419884033443453:m5nhvy4hmyq">
- <input type="hidden" name="ie" value="UTF-8">
- <input type="text" name="q" size="21">
- <input type="submit" name="sa" value="Search">
- </div>
-</form>
-<script type="text/javascript"
src="http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en"></script><h3
id="Navigation-Community"><a shape="rect"
href="community.html">Community</a></h3><ul class="alternate"><li><a
shape="rect" href="support.html">Support</a></li><li><a shape="rect"
href="contributing.html">Contributing</a></li><li><a shape="rect"
href="mailing-lists.html">Mailing Lists</a></li><li><a shape="rect"
href="irc-room.html">Gitter / IRC Chat</a></li><li><a shape="rect"
href="user-stories.html">User Stories</a></li><li><a shape="rect"
href="news.html">News</a></li><li><a shape="rect"
href="articles.html">Articles</a></li><li><a shape="rect"
href="site.html">Site</a></li><li><a shape="rect"
href="team.html">Team</a></li><li><a shape="rect" class="external-link"
href="http://camel-extra.googlecode.com/" rel="nofollow">Camel
Extra</a></li></ul><h3 id="Navigation-Developers"><a shape="rect"
href="developers.html">Developers</a></h3><ul class="alternate"><li><a s
hape="rect" href="developers.html">Developer Guide</a></li><li><a shape="rect"
href="source.html">Source</a></li><li><a shape="rect" class="external-link"
href="https://github.com/apache/camel/" rel="nofollow">Github</a></li><li><a
shape="rect" href="building.html">Building</a></li><li><a shape="rect"
href="javadoc.html">JavaDoc</a></li></ul><h3
id="Navigation-ApacheSoftwareFoundation">Apache Software Foundation</h3><ul
class="alternate"><li><a shape="rect" class="external-link"
href="http://www.apache.org/licenses/">License</a></li><li><a shape="rect"
class="external-link"
href="http://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li><li><a
shape="rect" class="external-link"
href="http://www.apache.org/foundation/thanks.html">Thanks</a></li><li><a
shape="rect" class="external-link"
href="http://www.apache.org/security/">Security</a></li></ul><p> </p><p><a
shape="rect" class="external-link"
href="http://www.apache.org/events/current-event.html"><span class="confl
uence-embedded-file-wrapper"><img class="confluence-embedded-image
confluence-external-resource"
src="http://www.apache.org/events/current-event-125x125.png"
data-image-src="http://www.apache.org/events/current-event-125x125.png"></span></a></p></div>
+<div class="navigation_bottom" id="navigation_bottom"><h3
id="Navigation-Overview"><a shape="rect"
href="overview.html">Overview</a></h3><ul class="alternate"><li><a shape="rect"
href="index.html">Home</a></li><li><a shape="rect"
href="download.html">Download</a></li><li><a shape="rect"
href="getting-started.html">Getting Started</a></li><li><a shape="rect"
href="faq.html">FAQ</a></li></ul><h3 id="Navigation-Documentation"><a
shape="rect" href="documentation.html">Documentation</a></h3><ul
class="alternate"><li><a shape="rect" href="user-guide.html">User
Guide</a></li><li><a shape="rect" href="manual.html">Manual</a></li><li><a
shape="rect" href="books.html">Books</a></li><li><a shape="rect"
href="tutorials.html">Tutorials</a></li><li><a shape="rect"
href="examples.html">Examples</a></li><li><a shape="rect"
href="cookbook.html">Cookbook</a></li><li><a shape="rect"
href="architecture.html">Architecture</a></li><li><a shape="rect"
href="enterprise-integration-patterns.html">Enterprise
Integration Patterns</a></li><li><a shape="rect"
href="dsl.html">DSL</a></li><li><a shape="rect"
href="components.html">Components</a></li><li><a shape="rect"
href="data-format.html">Data Format</a></li><li><a shape="rect"
href="languages.html">Languages</a></li><li><a shape="rect"
href="security.html">Security</a></li><li><a shape="rect"
href="security-advisories.html">Security Advisories</a></li></ul><h3
id="Navigation-Search">Search</h3><div class="aui-message aui-message-error"><p
class="title"><strong>Error rendering macro 'html'</strong></p><p>Your
Confluence administrator has disallowed the use of Javascript in the HTML
macro. This setting can be changed using HTML for Confluence Configuration.
Please see your administrator for details.</p></div><h3
id="Navigation-Community"><a shape="rect"
href="community.html">Community</a></h3><ul class="alternate"><li><a
shape="rect" href="support.html">Support</a></li><li><a shape="rect"
href="contributing.html">Contributing</a></li>
<li><a shape="rect" href="mailing-lists.html">Mailing Lists</a></li><li><a
shape="rect" href="irc-room.html">Gitter / IRC Chat</a></li><li><a shape="rect"
href="user-stories.html">User Stories</a></li><li><a shape="rect"
href="news.html">News</a></li><li><a shape="rect"
href="articles.html">Articles</a></li><li><a shape="rect"
href="site.html">Site</a></li><li><a shape="rect"
href="team.html">Team</a></li><li><a shape="rect" class="external-link"
href="http://camel-extra.googlecode.com/" rel="nofollow">Camel
Extra</a></li></ul><h3 id="Navigation-Developers"><a shape="rect"
href="developers.html">Developers</a></h3><ul class="alternate"><li><a
shape="rect" href="developers.html">Developer Guide</a></li><li><a shape="rect"
href="source.html">Source</a></li><li><a shape="rect" class="external-link"
href="https://github.com/apache/camel/" rel="nofollow">Github</a></li><li><a
shape="rect" href="building.html">Building</a></li><li><a shape="rect"
href="javadoc.html">JavaDoc</a></li></ul><
h3 id="Navigation-ApacheSoftwareFoundation">Apache Software Foundation</h3><ul
class="alternate"><li><a shape="rect" class="external-link"
href="http://www.apache.org/licenses/">License</a></li><li><a shape="rect"
class="external-link"
href="http://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li><li><a
shape="rect" class="external-link"
href="http://www.apache.org/foundation/thanks.html">Thanks</a></li><li><a
shape="rect" class="external-link"
href="http://www.apache.org/security/">Security</a></li></ul><p> </p><p><a
shape="rect" class="external-link"
href="http://www.apache.org/events/current-event.html"><span
class="confluence-embedded-file-wrapper"><img class="confluence-embedded-image
confluence-external-resource"
src="http://www.apache.org/events/current-event-125x125.png"
data-image-src="http://www.apache.org/events/current-event-125x125.png"></span></a></p></div>
<!-- NavigationBar -->
</div>
</div>