9.8
CVE-2020-36282
- EPSS 1.7%
- Veröffentlicht 12.03.2021 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:29:12
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rabbitmq ≫ Jms Client SwPlatformrabbitmq Version >= 1.0.0 < 1.15.2
Rabbitmq ≫ Jms Client SwPlatformrabbitmq Version >= 2.0.0 < 2.2.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.7% | 0.806 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.