Improper Input Validation Affecting org.apache.qpid:qpid-jms-client package, versions [0.1.0,0.10.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.34% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEQPID-30714
  • published4 Jul 2016
  • disclosed4 Jul 2016
  • creditUnknown

Introduced: 4 Jul 2016

CVE-2016-4974  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade org.apache.qpid:qpid-jms-client to version 0.10.0 or higher.

Overview

org.apache.qpid:qpid-jms-client is an AMQP 1.0 Java Message Service 2.0 client built using Qpid Proton.

Affected versions of this package are vulnerable to Improper Input Validation. Apache Qpid AMQP 0-x JMS client does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.

References

CVSS Scores

version 3.1