Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libspring-aop-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-beans-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-context-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-context-support-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-core-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-expression-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-instrument-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-jdbc-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-jms-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-messaging-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-orm-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-oxm-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-test-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-transaction-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-web-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-web-portlet-java", "binary_version": "4.3.22-1~18.04" }, { "binary_name": "libspring-web-servlet-java", "binary_version": "4.3.22-1~18.04" } ] }