CVE-2023-34050
moderate-risk
Published 2023-10-19
In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content
Do I need to act?
!
41.1% chance of exploitation in next 30 days
EPSS score — higher than 59% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.0/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (2)
Mitigation
https://spring.io/security/cve-2023-34050
Mitigation
https://spring.io/security/cve-2023-34050
38
/ 100
moderate-risk
Severity
16/34 · Moderate
Exploitability
17/34 · Moderate
Exposure
5/34 · Minimal