Improper Input Validation Affecting org.apache.qpid:qpid-jms-client Open this link in a new tab package, versions [0.1.0,0.10.0)


0.0
high
  • Attack Complexity

    High

  • Confidentiality

    High

  • Integrity

    High

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEQPID-30714

  • published

    4 Jul 2016

  • disclosed

    4 Jul 2016

  • credit

    Unknown

How to fix?

Upgrade org.apache.qpid:qpid-jms-client to version 0.10.0 or higher.

Overview

org.apache.qpid:qpid-jms-client is an AMQP 1.0 Java Message Service 2.0 client built using Qpid Proton.

Affected versions of this package are vulnerable to Improper Input Validation. Apache Qpid AMQP 0-x JMS client does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.

References