JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
References
Link | Resource |
---|---|
https://github.com/rabbitmq/rabbitmq-jms-client/issues/135 | Patch Third Party Advisory |
https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2 | Release Notes Third Party Advisory |
https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0 | Release Notes Third Party Advisory |
https://medium.com/%40ramon93i7/a99645d0448b |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-03-12T00:27:02
Updated: 2021-03-12T00:27:02
Reserved: 2021-03-12T00:00:00
Link: CVE-2020-36282
JSON object: View
NVD Information
Status : Modified
Published: 2021-03-12T01:15:12.373
Modified: 2023-11-07T03:22:14.103
Link: CVE-2020-36282
JSON object: View
Redhat Information
No data.
CWE