First published: Fri Mar 12 2021(Updated: )
JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RabbitMQ (Pivotal Software) | >=1.0.0<1.15.2 | |
RabbitMQ (Pivotal Software) | >=2.0.0<2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36282 is considered high severity due to its potential for code execution via unsafe deserialization.
To mitigate CVE-2020-36282, upgrade to RabbitMQ JMS Client version 1.15.2 or 2.2.0 or later.
CVE-2020-36282 affects RabbitMQ JMS Client versions prior to 1.15.2 and 2.2.0.
CVE-2020-36282 is a vulnerability associated with unsafe deserialization leading to potential remote code execution.
If you are using an affected version of RabbitMQ JMS Client, you should upgrade immediately to avoid security risks.