Description
A vulnerability exists in Google Apigee's JavaCallout policy https://docs.apigee.com/api-platform/reference/policies/java-callout-policy that allows for remote code execution. It is possible for a user to write a JavaCallout that injected a malicious object into the MessageContext to execute arbitrary Java code and system commands at runtime, leading to unauthorized access to data, lateral movement within the network, and access to backend systems. The Apigee hybrid versions below have all been updated to protect from this vulnerability: * Hybrid_1.11.2+ * Hybrid_1.12.4+ * Hybrid_1.13.3+ * Hybrid_1.14.1+ * OPDK_5202+ * OPDK_5300+
Problem types
CWE-913 Improper Control of Dynamically-Managed Code Resources
Product status
Any version before Hybrid_1.11.2
Any version before Hybrid_1.12.4
Any version before Hybrid_1.13.3
Any version before Hybrid_1.14.1
Any version before OPDK_5202
Any version before OPDK_5300
Credits
Nikita Markevich
References
docs.cloud.google.com/apigee/docs/hybrid/release-notes