[ 
https://issues.apache.org/jira/browse/CAMEL-21880?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17936556#comment-17936556
 ] 

Andrea Cosentino edited comment on CAMEL-21880 at 3/18/25 5:01 PM:
-------------------------------------------------------------------

If you expose an http endpoint you can append a request parameter and having 
that translated to an header, if you explicitly send an header malformed you 
must know the subsequent component, you have to do on purpose and you should 
have access to the entrypoint. To me this is a different case. and also how do 
you know what is the downstream component you're sending the header to? With an 
HTTP endpoint is quite different. The cve clear state you have to use HTTP 
endpoint as consumer. If you send a malformed header you must:
- have access to the environment running camel or at least access the entry 
point
- know the downstream component
- know what is the URI of the configured downstream component

To me is a completely different context. Nevertheless I'll go through the 
strategies and add lowercase, but I think we are not in the case described in 
the CVE, because the original condition is using one of the HTTP components.


was (Author: ancosen):
If you expose an http endpoint you can append a request parameter and having 
that translated to an header, if you explicitly send an header malformed you 
must know the subsequent component and you have to do on purpose. To me this is 
a different case. and also how do you know what is the downstream component 
you're sending the header to? With an HTTP endpoint is quite different. The cve 
clear state you have to use HTTP endpoint as consumer. If you send a malformed 
header you must:
- have access to the environment running camel or at least access the entry 
point
- know the downstream component
- know what is the URI of the configured downstream component

To me is a completely different context. Nevertheless I'll go through the 
strategies and add lowercase, but I think we are not in the case described in 
the CVE, because the original condition is using one of the HTTP components.

> camel-kafka - add lowerCase to header filter strategy
> -----------------------------------------------------
>
>                 Key: CAMEL-21880
>                 URL: https://issues.apache.org/jira/browse/CAMEL-21880
>             Project: Camel
>          Issue Type: Improvement
>          Components: camel-kafka
>    Affects Versions: 3.22.3, 4.10.2
>            Reporter: Jens Kordowski
>            Priority: Major
>
> Due to [https://www.cve.org/CVERecord?id=CVE-2025-27636] the following 
> extension has been implemented: 
> https://issues.apache.org/jira/browse/CAMEL-21828
> This has an effect on 
> [https://github.com/apache/camel/blob/main/components/camel-http-common/src/main/java/org/apache/camel/http/common/HttpHeaderFilterStrategy.java]
>  as it sets lowerCase to true. The same is not true for 
> [https://github.com/apache/camel/blob/main/components/camel-kafka/src/main/java/org/apache/camel/component/kafka/KafkaHeaderFilterStrategy.java]
> Very old implementations of the same 
> ([https://github.com/apache/camel/blob/camel-2.25.4/components/camel-kafka/src/main/java/org/apache/camel/component/kafka/KafkaHeaderFilterStrategy.java])
>  were using patterns, which were explicitly marked case-insensitive and this 
> changed thereafter. Following this recent CVE and the changes, I assume this 
> was not desired, hence I marked it as bug.
>  
> There might be other header filter strategies out there that do not set 
> lowerCase to true.
>  
> Best regards
> Jens



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to