First published: Sat Jul 15 2023(Updated: )
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, the new version is set to be released as soon as possible.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.eventmesh:eventmesh-connector-rabbitmq | >=1.7.0<=1.8.0 | |
Apache EventMesh | >=1.7.0<=1.8.0 | |
Apple macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
All of | ||
Any of | ||
Apple macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Apache EventMesh | >=1.7.0<=1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26512 is a vulnerability in the Apache EventMesh RabbitMQ-Connector plugin that allows remote code execution through deserialization of untrusted data.
CVE-2023-26512 has a severity rating of 9.8 (Critical).
CVE-2023-26512 affects Apache EventMesh (incubating) V1.7.0 to V1.8.0 on Windows, Linux, and Mac OS platforms.
Attackers can exploit CVE-2023-26512 by sending controlled messages via rabbitmq messages to execute remote code.
Yes, here are some references for CVE-2023-26512: [Reference 1](https://lists.apache.org/thread/zb1d62wh8o8pvntrnx4t1hj8vz0pm39p), [Reference 2](https://nvd.nist.gov/vuln/detail/CVE-2023-26512), [Reference 3](https://github.com/advisories/GHSA-fj8f-56wc-q36r).