VMware Spring Advanced Message Queuing Protocol (AMQP) 2.2.6

CPE Details

VMware Spring Advanced Message Queuing Protocol (AMQP) 2.2.6
2.2.6
2020-05-28
15h45 +00:00
2020-05-28
15h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.6:*:*:*:*:*:*:*

Informations

Vendor

vmware

Product

spring_advanced_message_queuing_protocol

Version

2.2.6

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-34050 2023-10-19 07h11 +00:00 In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content
5
Medium
CVE-2021-22095 2021-11-30 17h41 +00:00 In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message
6.5
Medium
CVE-2021-22097 2021-10-28 13h24 +00:00 In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called.
6.5
Medium