GHSA-v525-c3g5-cg9p

Suggest an improvement
Source
https://github.com/advisories/GHSA-v525-c3g5-cg9p
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-v525-c3g5-cg9p/GHSA-v525-c3g5-cg9p.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v525-c3g5-cg9p
Aliases
Published
2021-12-10T17:15:49Z
Modified
2024-12-02T05:35:24.873014Z
Summary
Unsafe Deserialization that can Result in Code Execution
Details

JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.

Database specific
{
    "nvd_published_at": "2021-03-12T01:15:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-03-15T23:45:19Z"
}
References

Affected packages

Maven / com.rabbitmq.jms:rabbitmq-jms

Package

Name
com.rabbitmq.jms:rabbitmq-jms
View open source insights on deps.dev
Purl
pkg:maven/com.rabbitmq.jms/rabbitmq-jms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0
Fixed
2.2.0

Affected versions

2.*

2.0.0
2.1.0
2.1.1

Maven / com.rabbitmq.jms:rabbitmq-jms

Package

Name
com.rabbitmq.jms:rabbitmq-jms
View open source insights on deps.dev
Purl
pkg:maven/com.rabbitmq.jms/rabbitmq-jms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0
Fixed
1.15.2

Affected versions

1.*

1.4.7
1.5.0
1.6.0
1.7.0
1.8.0
1.8.1
1.9.0
1.10.0
1.11.0
1.11.1
1.11.2
1.12.0
1.13.0
1.14.0
1.15.0
1.15.1