CVE-2021-22097

Source
https://cve.org/CVERecord?id=CVE-2021-22097
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-22097.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-22097
Aliases
Published
2021-10-28T16:15:08.023Z
Modified
2026-02-11T12:51:14.636549Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called.

References

Affected packages

Git / github.com/spring-projects/spring-amqp

Affected ranges

Type
GIT
Repo
https://github.com/spring-projects/spring-amqp
Events

Affected versions

v2.*
v2.2.0.RELEASE
v2.2.1.RELEASE
v2.2.10.RELEASE
v2.2.11.RELEASE
v2.2.12.RELEASE
v2.2.13.RELEASE
v2.2.14.RELEASE
v2.2.15.RELEASE
v2.2.16.RELEASE
v2.2.17.RELEASE
v2.2.18.RELEASE
v2.2.2.RELEASE
v2.2.3.RELEASE
v2.2.4.RELEASE
v2.2.5.RELEASE
v2.2.6.RELEASE
v2.2.7.RELEASE
v2.2.8.RELEASE
v2.2.9.RELEASE
v2.3.0
v2.3.1
v2.3.10
v2.3.2
v2.3.3
v2.3.4
v2.3.5
v2.3.6
v2.3.7
v2.3.8
v2.3.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-22097.json"