Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-aop-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-beans-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-context-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-context-support-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-core-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-expression-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-instrument-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-jdbc-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-jms-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-messaging-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-orm-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-oxm-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-test-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-transaction-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-web-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-web-portlet-java" }, { "binary_version": "4.3.22-1~18.04", "binary_name": "libspring-web-servlet-java" } ] }