First published: Fri May 12 2023(Updated: )
Vert.x STOMP is a vert.x implementation of the STOMP specification that provides a STOMP server and client. From versions 3.1.0 until 3.9.16 and 4.0.0 until 4.4.2, a Vert.x STOMP server processes client STOMP frames without checking that the client send an initial CONNECT frame replied with a successful CONNECTED frame. The client can subscribe to a destination or publish message without prior authentication. Any Vert.x STOMP server configured with an authentication handler is impacted. The issue is patched in Vert.x 3.9.16 and 4.4.2. There are no trivial workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Vert.x Stomp | >=3.1.0<3.9.16 | |
Eclipse Vert.x Stomp | >=4.0.0<4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32081 is a vulnerability in the Vert.x STOMP server that allows clients to send STOMP frames without an initial CONNECT frame, leading to potential security risks.
CVE-2023-32081 has a severity rating of 6.5, which is considered medium.
Versions 3.1.0 to 3.9.16 and 4.0.0 to 4.4.2 of Eclipse Vert.x Stomp are affected by CVE-2023-32081.
To fix CVE-2023-32081, update your Eclipse Vert.x Stomp server to a version that is not affected by this vulnerability.
More information about CVE-2023-32081 can be found in the references section of the vulnerability report.