Improper Input Validation Affecting org.apache.qpid:qpid-jms-client package, versions [0.1.0,0.10.0)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHEQPID-30714
- published 4 Jul 2016
- disclosed 4 Jul 2016
- credit Unknown
How to fix?
Upgrade org.apache.qpid:qpid-jms-client
to version 0.10.0 or higher.
Overview
org.apache.qpid:qpid-jms-client is an AMQP 1.0 Java Message Service 2.0 client built using Qpid Proton.
Affected versions of this package are vulnerable to Improper Input Validation. Apache Qpid AMQP 0-x JMS client does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject
function.