org.springframework.kafka:spring-kafka@2.9.2 vulnerabilities

  • latest version

    3.3.5

  • latest non vulnerable version

  • first published

    8 years ago

  • latest version published

    11 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.springframework.kafka:spring-kafka package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Deserialization of Untrusted Data

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data when improperly configured. In order to exploit this vulnerability a local attacker would have to construct a malicious serialized object in one of the deserialization exception record headers.

    Specifically, an application is vulnerable when all of the following are true:

    1. The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record.

    2. The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true.

    3. The user allows untrusted sources to publish to a Kafka topic.

    Note: By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.

    How to fix Deserialization of Untrusted Data?

    Upgrade org.springframework.kafka:spring-kafka to version 2.9.11, 3.0.10 or higher.

    [2.8.1,2.9.11)[3.0.0,3.0.10)