{"id":"CVE-2018-8041","details":"Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal.","aliases":["GHSA-jv74-f9pj-xp3f"],"modified":"2026-04-10T04:11:24.309462Z","published":"2018-09-17T14:29:00.920Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"},{"type":"ADVISORY","url":"http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/105352"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"type":"REPORT","url":"https://issues.apache.org/jira/browse/CAMEL-12630"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/camel","events":[{"introduced":"aff4434eb839e9d690a0419230264b14a0ddeb22"},{"last_affected":"32bfda73ddd1ea8576bcb53dac496af9e0825f1a"},{"introduced":"36bea62e844c5037b8c4d9e0eab5cc6b189fe1da"},{"last_affected":"dedf656c7526ab6189519f0733e25ed3fed369f7"},{"introduced":"0"},{"last_affected":"363777cc93ab6072cd12d2a231c2165cbc6c0524"}],"database_specific":{"versions":[{"introduced":"2.20.0"},{"last_affected":"2.20.3"},{"introduced":"2.21.0"},{"last_affected":"2.21.1"},{"introduced":"0"},{"last_affected":"2.22.0"}]}}],"versions":["camel-2.15.0","camel-2.16.0","camel-2.20.0","camel-2.20.3","camel-2.21.1","camel-2.22.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-8041.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}