Deserialization of untrusted data in Apache Qpid Dispatch Router - CVE-2016-4974
Published: July 8, 2016 / Updated: March 21, 2018
Vulnerability identifier: #VU105
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2016-4974
CWE-ID: CWE-502
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Apache Foundation
Affected software:
Apache Qpid Dispatch Router
Apache Qpid Dispatch Router
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to access control error in Apache Qpid. A remote unauthenticated attacker can cause arbitrary code execution by a deserialization flaw in applications that call the getObject() function on a JMS ObjectMessage and invoke restricted classes on the application classpath.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
The vulnerability exists due to access control error in Apache Qpid. A remote unauthenticated attacker can cause arbitrary code execution by a deserialization flaw in applications that call the getObject() function on a JMS ObjectMessage and invoke restricted classes on the application classpath.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2016-4974
The vendor has issued a fix (Qpid AMQP 0-x JMS client 6.0.4; Qpid JMS (AMQP 1.0) client 0.10.0).