CVE-2016-4974
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
13/07/2016
Last modified:
12/04/2025
Description
Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:amqp_0-x_jms_client:*:*:*:*:*:*:*:* | 6.0.3 (including) | |
| cpe:2.3:a:apache:jms_client_amqp:*:*:*:*:*:*:*:* | 0.9.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html
- http://qpid.apache.org/components/jms/security-0-x.html
- http://qpid.apache.org/components/jms/security.html
- http://www.securityfocus.com/archive/1/538813/100/0/threaded
- http://www.securityfocus.com/bid/91537
- http://www.securitytracker.com/id/1036239
- https://issues.apache.org/jira/browse/QPIDJMS-188
- http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html
- http://qpid.apache.org/components/jms/security-0-x.html
- http://qpid.apache.org/components/jms/security.html
- http://www.securityfocus.com/archive/1/538813/100/0/threaded
- http://www.securityfocus.com/bid/91537
- http://www.securitytracker.com/id/1036239
- https://issues.apache.org/jira/browse/QPIDJMS-188



