CVE-2023-34050

Severity CVSS v4.0:
Pending analysis
Type:
CWE-502 Deserialization of Untrusted Dat
Publication date:
19/10/2023
Last modified:
25/10/2023

Description

<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> In spring AMQP versions 1.0.0 to<br /> 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class<br /> names were added to Spring AMQP, allowing users to lock down deserialization of<br /> data in messages from untrusted sources; however by default, when no allowed<br /> list was provided, all classes could be deserialized.<br /> <br /> <br /> <br /> Specifically, an application is<br /> vulnerable if<br /> <br /> <br /> <br /> <br /> * the<br /> SimpleMessageConverter or SerializerMessageConverter is used<br /> <br /> * the user<br /> does not configure allowed list patterns<br /> <br /> * untrusted<br /> message originators gain permissions to write messages to the RabbitMQ<br /> broker to send malicious content<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:* 1.0.0 (including) 2.4.16 (excluding)
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:* 3.0.0 (including) 3.0.9 (excluding)


References to Advisories, Solutions, and Tools