Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html | Third Party Advisory VDB Entry |
http://qpid.apache.org/components/jms/security-0-x.html | Vendor Advisory |
http://qpid.apache.org/components/jms/security.html | Vendor Advisory |
http://www.securityfocus.com/archive/1/538813/100/0/threaded | |
http://www.securityfocus.com/bid/91537 | VDB Entry Third Party Advisory |
http://www.securitytracker.com/id/1036239 | Third Party Advisory VDB Entry |
https://issues.apache.org/jira/browse/QPIDJMS-188 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2016-07-13 15:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-4974
Mitre link : CVE-2016-4974
CVE.ORG link : CVE-2016-4974
JSON object : View
Products Affected
apache
- jms_client_amqp
- amqp_0-x_jms_client
CWE
CWE-20
Improper Input Validation