JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
References
Link | Resource |
---|---|
https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0 | Release Notes Third Party Advisory |
https://github.com/rabbitmq/rabbitmq-jms-client/issues/135 | Patch Third Party Advisory |
https://medium.com/@ramon93i7/a99645d0448b | Third Party Advisory |
https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2 | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-03-11 17:15
Updated : 2021-03-18 12:05
NVD link : CVE-2020-36282
Mitre link : CVE-2020-36282
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
rabbitmq
- jms_client