Lucene search

K

Spring Advanced Message Queuing Protocol Security Vulnerabilities

cve
cve

CVE-2016-2173

org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.

9.8CVSS

9.5AI Score

0.02EPSS

2017-04-21 08:59 PM
51
cve
cve

CVE-2021-22095

In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message

6.5CVSS

6.3AI Score

0.001EPSS

2021-11-30 07:15 PM
38
cve
cve

CVE-2021-22097

In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% ...

6.5CVSS

6.4AI Score

0.001EPSS

2021-10-28 04:15 PM
55
cve
cve

CVE-2023-34050

In spring AMQP versions 1.0.0 to2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable classnames were added to Spring AMQP, allowing users to lock down deserialization ofdata in messages from untrusted sources; however by default, when no allowedlist was provided, all classes could b...

5CVSS

4.8AI Score

0.0005EPSS

2023-10-19 08:15 AM
61