In Pivotal Spring AMQP versions before 1.7.4, 1.6.11, and 1.5.7, an org.springframework.amqp.core.Message may be unsafely deserialized when being converted into a string. A malicious payload could be crafted to exploit this and enable a remote code execution attack.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pivotal software spring advanced message queuing protocol 1.7.3 |
||
pivotal software spring advanced message queuing protocol 1.7.2 |
||
pivotal software spring advanced message queuing protocol 1.7.1 |
||
pivotal software spring advanced message queuing protocol 1.7.0 |
||
pivotal software spring advanced message queuing protocol 1.6.0 |
||
pivotal software spring advanced message queuing protocol 1.6.1 |
||
pivotal software spring advanced message queuing protocol 1.6.2 |
||
pivotal software spring advanced message queuing protocol 1.6.3 |
||
pivotal software spring advanced message queuing protocol 1.6.4 |
||
pivotal software spring advanced message queuing protocol 1.6.5 |
||
pivotal software spring advanced message queuing protocol 1.6.6 |
||
pivotal software spring advanced message queuing protocol 1.6.7 |
||
pivotal software spring advanced message queuing protocol 1.6.8 |
||
pivotal software spring advanced message queuing protocol 1.6.9 |
||
pivotal software spring advanced message queuing protocol 1.6.10 |
||
pivotal software spring advanced message queuing protocol 1.5.0 |
||
pivotal software spring advanced message queuing protocol 1.5.1 |
||
pivotal software spring advanced message queuing protocol 1.5.2 |
||
pivotal software spring advanced message queuing protocol 1.5.3 |
||
pivotal software spring advanced message queuing protocol 1.5.4 |
||
pivotal software spring advanced message queuing protocol 1.5.5 |
||
pivotal software spring advanced message queuing protocol 1.5.6 |