Loading HuntDB...

GHSA-24f5-5fmf-pwmc

GitHub Security Advisory

⚠ Unreviewed MODERATE Has CVE

Advisory Details

In spring AMQP versions 1.0.0 to
2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class
names were added to Spring AMQP, allowing users to lock down deserialization of
data in messages from untrusted sources; however by default, when no allowed
list was provided, all classes could be deserialized.

Specifically, an application is
vulnerable if

* the
SimpleMessageConverter or SerializerMessageConverter is used

* the user
does not configure allowed list patterns

* untrusted
message originators gain permissions to write messages to the RabbitMQ
broker to send malicious content

Related CVEs

Key Information

GHSA ID
GHSA-24f5-5fmf-pwmc
Published
October 19, 2023 9:30 AM
Last Modified
April 4, 2024 8:47 AM
CVSS Score
5.0 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: September 19, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.