| |
Vulnerability CVE-2021-22097
Published: 2021-10-28
Description: |
In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called. |
Type:
CWE-502 (Deserialization of Untrusted Data)
CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.8/10 |
6.9/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
None |
Complete |
References: |
https://tanzu.vmware.com/security/cve-2021-22097
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|