activemq -- Unsafe deserialization

2016-01-08T00:00:00
ID A258604D-F2AA-11E5-B4A9-AC220BDCEC59
Type freebsd
Reporter FreeBSD
Modified 2016-01-08T00:00:00

Description

Alvaro Muatoz, Matthias Kaiser and Christian Schneider reports:

JMS Object messages depends on Java Serialization for marshaling/unmashaling of the message payload. There are a couple of places inside the broker where deserialization can occur, like web console or stomp object message transformation. As deserialization of untrusted data can lead to security flaws as demonstrated in various reports, this leaves the broker vulnerable to this attack vector. Additionally, applications that consume ObjectMessage type of messages can be vulnerable as they deserialize objects on ObjectMessage.getObject() calls.