Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html | Third Party Advisory VDB Entry |
https://issues.apache.org/jira/browse/QPIDJMS-188 | Issue Tracking |
http://qpid.apache.org/components/jms/security.html | Vendor Advisory |
http://qpid.apache.org/components/jms/security-0-x.html | Vendor Advisory |
http://www.securityfocus.com/bid/91537 | VDB Entry Third Party Advisory |
http://www.securitytracker.com/id/1036239 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/538813/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-07-13 08:59
Updated : 2018-10-09 13:00
NVD link : CVE-2016-4974
Mitre link : CVE-2016-4974
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apache
- amqp_0-x_jms_client
- jms_client_amqp