Security notices
Security notices
Camunda publishes security notices after fixes are available.
Notice 13
Publication date
July 18th, 2024
Product affected
Camunda Identity
Impact
The version of Apache Tomcat
used by Camunda Identity was affected by the following vulnerability:
How to determine if the installation is affected
You are using Camunda Identity version 8.5.3 or previous.
Solution
Camunda has provided the following release which contains a fix:
Notice 12
Publication date
October 3rd, 2023
Product affected
Camunda Desktop Modeler
Impact
The version of libwebp
shipped with Camunda Desktop Modeler was affected by the following vulnerability:
How to determine if the installation is affected
You are using Camunda Desktop Modeler version 5.15.1 or previous.
Solution
Camunda has provided the following release which contains a fix:
Notice 11
Publication date
April 17, 2023
Product affected
Tasklist
Impact
The REST API functionality of Tasklist 8.2.0 and 8.2.1 allows unauthenticated access to the following methods/URLs:
- GET /v1/tasks/{taskId}
- POST /v1/tasks/search
- POST /v1/tasks/{taskId}/variables/search
- POST /v1/forms/{formId}
- POST /v1/variables/{variableId}
Find more information about the methods in our Tasklist REST API documentation.
Therefore, if you use Tasklist 8.2.0 or 8.2.1, and if you have sensible data stored in process variables (accessed by user tasks), this data could have been accessed by users knowing the endpoint of the Tasklist instance without authentication.
How to determine if the installation is affected
You are using Tasklist version 8.2.0 or 8.2.1.
Solution
Camunda has provided the following releases which contain a fix
Notice 10
Publication Date:
November 10th, 2022
Product affected:
Tasklist
Impact:
The Tasklist Docker image contain an OpenSSL version 3.0.2 for which the following CVEs have been published:
At this point, Camunda is not aware of any specific attack vector in Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are Tasklist version (8.0.3 ≥ version ≤ 8.0.7) or ≤ 8.1.2
Solution
Camunda has provided the following releases which contain a fix
Notice 9
Publication Date:
April 11th, 2022
Product affected:
Zeebe, Operate, Tasklist, IAM
Impact:
Zeebe, Operate, Tasklist and IAM are using the Spring framework for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2022-22965
At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate, Tasklist or IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using Zeebe, Operate or Tasklist version ≤ 1.2.11 or ≤ 1.3.6
Solution
Camunda has provided the following releases which contain a fix
Notice 8
Publication Date:
December 31th, 2021
Product affected:
Zeebe, Operate, Tasklist
Impact:
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44832. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using Zeebe, Operate or Tasklist version ≤ 1.2.8 or ≤ 1.1.9
Solution
Camunda has provided the following releases which contain a fix
Notice 7
Publication Date:
December 31th, 2021
Product affected:
IAM
Impact:
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44832. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using IAM version ≤ 1.2.8
Solution
Camunda has provided the following releases which contain a fix
Notice 6
Publication Date:
December 22th, 2021
Product affected:
Zeebe, Operate, Tasklist
Impact:
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45105. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using Zeebe, Operate or Tasklist version ≤ 1.2.7 or ≤ 1.1.8
Solution
Camunda has provided the following releases which contain a fix
Notice 5
Publication Date:
December 22th, 2021
Product affected:
IAM
Impact:
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45105. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.
IAM bundles logback libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-42550. At this point, Camunda is not aware of any specific attack vector in IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using IAM version ≤ 1.2.7
Solution
Camunda has provided the following releases which contain a fix
Notice 4
Publication Date:
December 17th, 2021
Product affected:
Zeebe, Operate, Tasklist
Impact:
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45046. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using Zeebe, Operate or Tasklist version ≤ 1.2.6 or ≤ 1.1.7
Solution
Camunda has provided the following releases which contain a fix
Notice 3
Publication Date:
December 17th, 2021
Product affected:
IAM
Impact:
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45046. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.
IAM bundles logback libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-42550. At this point, Camunda is not aware of any specific attack vector in IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using IAM version ≤ 1.2.6
Solution
Camunda has provided the following releases which contain a fix
Notice 2
Publication Date:
December 14th, 2021
Product affected:
Zeebe, Operate, Tasklist
Impact:
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44228. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using Zeebe, Operate or Tasklist version ≤ 1.2.5 or ≤ 1.1.6
Solution
Camunda has provided the following releases which contain a fix
Apply the patches mentioned above or set the JVM option -Dlog4j2.formatMsgNoLookups=true
Notice 1
Publication Date:
December 14th, 2021
Product affected:
IAM
Impact:
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44228. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability.
Still, Camunda recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected
You are using IAM version ≤ 1.2.5
Solution
Camunda has provided the following releases which contain a fix
Report a vulnerability
Please report security vulnerabilities to Camunda immediately. Please follow the steps on our Camunda Security page to report a vulnerability.
Additional security information
For more information about security at Camunda, including our security policy, security issue management, and more, see Camunda.com/security.