Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html - Third Party Advisory, VDB Entry | |
References | () http://qpid.apache.org/components/jms/security-0-x.html - Vendor Advisory | |
References | () http://qpid.apache.org/components/jms/security.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/538813/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/91537 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1036239 - Third Party Advisory, VDB Entry | |
References | () https://issues.apache.org/jira/browse/QPIDJMS-188 - Issue Tracking |
Information
Published : 2016-07-13 15:59
Updated : 2024-11-21 02:53
NVD link : CVE-2016-4974
Mitre link : CVE-2016-4974
CVE.ORG link : CVE-2016-4974
JSON object : View
Products Affected
apache
- jms_client_amqp
- amqp_0-x_jms_client
CWE
CWE-20
Improper Input Validation