First published: Tue Apr 12 2016(Updated: )
A remote code execution vulnerability was found in Spring AMQP. The class org.springframework.core.serializer.DefaultDeserializer does not validate the deserialized object against a whitelist. By supplying a crafted serialized object like Chris Frohoff's Commons Collection gadget, remote code execution can be achieved. External references: <a href="https://jira.spring.io/browse/AMQP-590">https://jira.spring.io/browse/AMQP-590</a> <a href="http://pivotal.io/security/cve-2016-2173">http://pivotal.io/security/cve-2016-2173</a> Upstream fix: <a href="https://github.com/spring-projects/spring-amqp/commit/4150f107e60cac4a7735fcf7cb4c1889a0cbab6c">https://github.com/spring-projects/spring-amqp/commit/4150f107e60cac4a7735fcf7cb4c1889a0cbab6c</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
Fedoraproject Fedora | =24 | |
Vmware Spring Advanced Message Queuing Protocol | <1.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.