In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content
References
Link Resource
https://spring.io/security/cve-2023-34050 Mitigation Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: vmware

Published: 2023-10-19T07:11:35.038Z

Updated: 2023-10-19T07:11:35.038Z

Reserved: 2023-05-25T17:21:56.203Z


Link: CVE-2023-34050

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-10-19T08:15:08.357

Modified: 2023-10-25T16:54:31.770


Link: CVE-2023-34050

JSON object: View

cve-icon Redhat Information

No data.

CWE