Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-34050

Опубликовано: 19 окт. 2023
Источник: redhat
CVSS3: 4.3
EPSS Средний

Описание

In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if

  • the SimpleMessageConverter or SerializerMessageConverter is used
  • the user does not configure allowed list patterns
  • untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content

    A flaw was found in Spring Framework AMQP. An allowed list exists in Spring AMQP, but when no allowed list is provided, all classes could be deserialized, allowing a malicious user to send harmful content to the broker.

Отчет

This flaw requires previous knowledge and access to the messages in order to get them deserialized and possibly leak information. It also requires missing server side configurations to prevent unwanted behavior. Therefore, this is rated as a Moderate impact.

Меры по смягчению последствий

An application may be vulnerable if:

  • The SimpleMessageConverter or SerializerMessageConverter is used
  • The user does not configure allowed list patterns
  • Untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content Make sure these are avoided in order to mitigate the issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2org.amqphub.spring-amqp-10-jms-spring-boot-parentAffected
A-MQ Clients 2org.apache.logging.log4j-log4jNot affected
Red Hat build of Apache Camel for Spring Boot 3spring-amqpWill not fix
Red Hat Enterprise Linux 9log4jNot affected
AMQ Clientsorg.amqphub.spring-amqp-10-jms-spring-boot-parentFixedRHSA-2023:769707.12.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2246065springframework-amqp: Deserialization Vulnerability

EPSS

Процентиль: 97%
0.41073
Средний

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5
nvd
почти 2 года назад

In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content

CVSS3: 5
github
почти 2 года назад

In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content

CVSS3: 6.5
fstec
почти 2 года назад

Уязвимость приложения для обмена сообщениями Spring AMQP RabbitMQ, связанная с недостатками механизма десериализации, позволяющая нарушителю получить несанкционированный доступ на запись сообщений в RabbitMQ

EPSS

Процентиль: 97%
0.41073
Средний

4.3 Medium

CVSS3