Quantcast
Channel: Files from Matthias Kaiser ≈ Packet Storm
Viewing all articles
Browse latest Browse all 9

Apache Qpid Untrusted Input Deserialization

$
0
0
When applications call getObject() on a consumed JMS ObjectMessage they are subject to the behaviour of any object deserialization during the process of constructing the body to return. Unless the application has taken outside steps to limit the deserialization process, they can't protect against input that might try to make undesired use of classes available on the application classpath that might be vulnerable to exploitation. Apache Qpid AMQP 0-x JMS client versions 6.0.3 and earlier and Qpid JMS (AMQP 1.0) client versions 0.9.0 and earlier are affected.

Viewing all articles
Browse latest Browse all 9

Trending Articles