Improper Input Validation Affecting org.apache.qpid:qpid-jms-client package, versions [0.1.0,0.10.0)


Severity

0.0
high
0
10

    Threat Intelligence

    EPSS
    1.07% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGAPACHEQPID-30714
  • published 4 Jul 2016
  • disclosed 4 Jul 2016
  • credit Unknown

How to fix?

Upgrade org.apache.qpid:qpid-jms-client to version 0.10.0 or higher.

Overview

org.apache.qpid:qpid-jms-client is an AMQP 1.0 Java Message Service 2.0 client built using Qpid Proton.

Affected versions of this package are vulnerable to Improper Input Validation. Apache Qpid AMQP 0-x JMS client does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.

References

CVSS Scores

version 3.1
Expand this section

Snyk

7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

7.5 high