Deserialization of untrusted data in Spring AMQP



Published: 2023-12-07 | Updated: 2024-06-28
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-34050
CWE-ID CWE-502
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Spring AMQP
Server applications / Other server solutions

Vendor VMware, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Deserialization of Untrusted Data

EUVDB-ID: #VU83980

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2023-34050

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: Yes

Description

The vulnerability allows a remote user to bypass certain security restrictions.

The vulnerability exists due to insecure input validation when processing serialized data. A remote user can write messages to the RabbitMQ broker and send malicious content to the server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Spring AMQP: 1.0.0 - 3.0.9

External links

http://spring.io/security/cve-2023-34050


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###