3.2.1
13 years ago
16 days ago
Known vulnerabilities in the org.springframework.amqp:spring-amqp package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.springframework.amqp:spring-amqp is a package that provides support for using Spring and Java with AMQP 0.9.1, and in particular RabbitMQ. Affected versions of this package are vulnerable to Deserialization of Untrusted Data arriving in AMQP messages. By default, when no allowed list is provided, all classes can be deserialized. Note An application is vulnerable if all of these conditions are met:
How to fix Deserialization of Untrusted Data? Upgrade | [1.0.0,2.4.17)[3.0.0,3.0.10) |
org.springframework.amqp:spring-amqp is a package that provides support for using Spring and Java with AMQP 0.9.1, and in particular RabbitMQ. Affected versions of this package are vulnerable to Denial of Service (DoS) by constructing a malicious How to fix Denial of Service (DoS)? Upgrade | [2.3.0,2.3.11)[,2.2.19) |
org.springframework.amqp:spring-amqp is a package that provides support for using Spring and Java with AMQP 0.9.1, and in particular RabbitMQ. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM) due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit. How to fix Man-in-the-Middle (MitM)? Upgrade | [1.0.0.RELEASE,1.7.10 .RELEASE)[2.0.0.RELEASE,2.0.6.RELEASE) |
Affected versions of Affected versions of the package are vulnerable to Remote Code Execution Through Deserialization of Unsafe Objects. The class org.springframework.core.serializer.DefaultDeserializer does not validate the deserialized object against a whitelist. By supplying a crafted serialized object like Chris Frohoff's Commons Collection gadget, remote code execution can be achieved. | [,1.5.5) |