3.2.1
13 years ago
16 days ago
Known vulnerabilities in the org.springframework.amqp:spring-amqp package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.springframework.amqp:spring-amqp is a package that provides support for using Spring and Java with AMQP 0.9.1, and in particular RabbitMQ. Affected versions of this package are vulnerable to Deserialization of Untrusted Data arriving in AMQP messages. By default, when no allowed list is provided, all classes can be deserialized. Note An application is vulnerable if all of these conditions are met:
How to fix Deserialization of Untrusted Data? Upgrade | [1.0.0,2.4.17)[3.0.0,3.0.10) |
org.springframework.amqp:spring-amqp is a package that provides support for using Spring and Java with AMQP 0.9.1, and in particular RabbitMQ. Affected versions of this package are vulnerable to Denial of Service (DoS) by constructing a malicious How to fix Denial of Service (DoS)? Upgrade | [2.3.0,2.3.11)[,2.2.19) |
org.springframework.amqp:spring-amqp is a package that provides support for using Spring and Java with AMQP 0.9.1, and in particular RabbitMQ. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM) due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit. How to fix Man-in-the-Middle (MitM)? Upgrade | [1.0.0.RELEASE,1.7.10 .RELEASE)[2.0.0.RELEASE,2.0.6.RELEASE) |
org.springframework.amqp:spring-amqp is a package that provides support for using Spring and Java with AMQP 0.9.1, and in particular RabbitMQ. Affected versions of this package are vulnerable to Arbitrary Code Execution. A malicious payload could be crafted to exploit this and enable a Arbitrary Code Execution attack during string conversions. How to fix Arbitrary Code Execution? Upgrade | [1.5.6.RELEASE,1.5.7.RELEASE)[1.6.10.RELEASE,1.6.11.RELEASE)[1.7.3.RELEASE,1.7.4.RELEASE) |