Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1meDdmLXJqcWotNTJwas4AAqeh

Deserialization of Untrusted Data in Spring AMQP

In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called.

Permalink: https://github.com/advisories/GHSA-fx7f-rjqj-52pj
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1meDdmLXJqcWotNTJwas4AAqeh
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: about 1 year ago


CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-fx7f-rjqj-52pj, CVE-2021-22097
References: Blast Radius: 22.8

Affected Packages

maven:org.springframework.amqp:spring-amqp
Dependent packages: 180
Dependent repositories: 3,237
Downloads:
Affected Version Ranges: >= 2.3.0, <= 2.3.10, >= 2.2.0, <= 2.2.18
Fixed in: 2.3.11, 2.2.19
All affected versions: 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.7, 2.3.8, 2.3.9, 2.3.10
All unaffected versions: 2.3.11, 2.3.12, 2.3.13, 2.3.14, 2.3.15, 2.3.16, 2.4.0, 2.4.1, 2.4.2, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.1.0, 3.1.1, 3.1.2, 3.1.3