Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
{
"binaries": [
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-aop-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-beans-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-context-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-context-support-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-core-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-expression-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-instrument-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-jdbc-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-jms-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-messaging-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-orm-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-oxm-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-test-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-transaction-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-web-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-web-portlet-java"
},
{
"binary_version": "4.3.22-1~18.04",
"binary_name": "libspring-web-servlet-java"
}
],
"availability": "No subscription required"
}