Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-34050

Опубликовано: 19 окт. 2023
Источник: nvd
CVSS3: 5
CVSS3: 4.3
EPSS Средний

Описание

In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized.

Specifically, an application is vulnerable if

  • the SimpleMessageConverter or SerializerMessageConverter is used

  • the user does not configure allowed list patterns

  • untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:*
Версия от 1.0.0 (включая) до 2.4.16 (исключая)
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:*
Версия от 3.0.0 (включая) до 3.0.9 (исключая)

EPSS

Процентиль: 97%
0.41073
Средний

5 Medium

CVSS3

4.3 Medium

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 4.3
redhat
почти 2 года назад

In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content

CVSS3: 5
github
почти 2 года назад

In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content

CVSS3: 6.5
fstec
почти 2 года назад

Уязвимость приложения для обмена сообщениями Spring AMQP RabbitMQ, связанная с недостатками механизма десериализации, позволяющая нарушителю получить несанкционированный доступ на запись сообщений в RabbitMQ

EPSS

Процентиль: 97%
0.41073
Средний

5 Medium

CVSS3

4.3 Medium

CVSS3

Дефекты

CWE-502