org.apache.qpid:qpid-jms-client@0.1.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.qpid:qpid-jms-client package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Input Validation

org.apache.qpid:qpid-jms-client is an AMQP 1.0 Java Message Service 2.0 client built using Qpid Proton.

Affected versions of this package are vulnerable to Improper Input Validation. Apache Qpid AMQP 0-x JMS client does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.

How to fix Improper Input Validation?

Upgrade org.apache.qpid:qpid-jms-client to version 0.10.0 or higher.

[0.1.0,0.10.0)