CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
AI Score
Confidence
High
EPSS
Percentile
19.0%
In spring AMQP versions 1.0.0 to
2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class
names were added to Spring AMQP, allowing users to lock down deserialization of
data in messages from untrusted sources; however by default, when no allowed
list was provided, all classes could be deserialized.
Specifically, an application is
vulnerable if
the
SimpleMessageConverter or SerializerMessageConverter is used
the user
does not configure allowed list patterns
untrusted
message originators gain permissions to write messages to the RabbitMQ
broker to send malicious content
Vendor | Product | Version | CPE |
---|---|---|---|
vmware | spring_advanced_message_queuing_protocol | * | cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"platforms": [
"MacOS",
"Linux",
"iOS",
"Android",
"x86",
"ARM",
"64 bit",
"Windows",
"32 bit"
],
"product": "Spring AMQP",
"vendor": "Spring",
"versions": [
{
"lessThan": "2.4.17",
"status": "affected",
"version": "1.0.0",
"versionType": "2.4.17"
},
{
"lessThan": "3.0.10",
"status": "affected",
"version": "3.0.0",
"versionType": "3.0.10"
}
]
}
]