logo

CVE-2016-4974 org.apache.qpid:qpid-jms-client

Package

Manager: maven
Name: org.apache.qpid:qpid-jms-client
Vulnerable Version: >=0 <0.10.0

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.02129 pctl0.8351

Details

Improper Input Validation in Apache Qpid AMQP 0-x JMS Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.

Metadata

Created: 2022-05-14T02:46:14Z
Modified: 2022-07-06T19:53:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-f38p-mq64-h784/GHSA-f38p-mq64-h784.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-f38p-mq64-h784
Finding: F184
Auto approve: 1