Bug 2246065 (CVE-2023-34050) - CVE-2023-34050 springframework-amqp: Deserialization Vulnerability
Summary: CVE-2023-34050 springframework-amqp: Deserialization Vulnerability
Keywords:
Status: NEW
Alias: CVE-2023-34050
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2246064
TreeView+ depends on / blocked
 
Reported: 2023-10-25 08:39 UTC by ybuenos
Modified: 2024-04-30 23:00 UTC (History)
11 users (show)

Fixed In Version: spring-amqp 2.7.17, spring-amqp 3.0.12,spring-amqp 3.1.5, spring-amqp 3.2.0
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:7697 0 None None None 2023-12-07 13:42:17 UTC

Description ybuenos 2023-10-25 08:39:30 UTC
In spring AMQP versions 1.0.0 to
2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class
names were added to Spring AMQP, allowing users to lock down deserialization of
data in messages from untrusted sources; however by default, when no allowed
list was provided, all classes could be deserialized.

Specifically, an application is vulnerable if

   *  the
     SimpleMessageConverter or SerializerMessageConverter is used

   *  the user
     does not configure allowed list patterns

   *  untrusted
     message originators gain permissions to write messages to the RabbitMQ
     broker to send malicious content

https://spring.io/security/cve-2023-34050

Comment 4 errata-xmlrpc 2023-12-07 13:42:16 UTC
This issue has been addressed in the following products:

  AMQ Clients 3.y for RHEL 8
  AMQ Clients 3.y for RHEL 9

Via RHSA-2023:7697 https://access.redhat.com/errata/RHSA-2023:7697


Note You need to log in before you can comment on or make changes to this bug.