You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit.
dev-mend-for-github-combot
changed the title
CVE-2018-11087 (Medium, non-reachable) detected in multiple libraries
CVE-2018-11087 (Medium) detected in multiple libraries
Apr 28, 2023
dev-mend-for-github-combot
changed the title
CVE-2018-11087 (Medium) detected in multiple libraries
CVE-2018-11087 (Medium, unreachable) detected in multiple libraries
Apr 30, 2024
dev-mend-for-github-combot
changed the title
CVE-2018-11087 (Medium, unreachable) detected in multiple libraries
CVE-2018-11087 (Medium, reachable) detected in multiple libraries
Dec 30, 2024
dev-mend-for-github-combot
changed the title
CVE-2018-11087 (Medium, reachable) detected in multiple libraries
CVE-2018-11087 (Medium) detected in multiple libraries
Jan 1, 2025
CVE-2018-11087 - Medium Severity Vulnerability
Vulnerable Libraries - spring-amqp-1.7.1.RELEASE.jar, amqp-client-4.0.2.jar, spring-rabbit-1.7.1.RELEASE.jar
spring-amqp-1.7.1.RELEASE.jar
Spring AMQP Core
Library home page: https://projects.spring.io/spring-amqp
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/amqp/spring-amqp/1.7.1.RELEASE/spring-amqp-1.7.1.RELEASE.jar
Dependency Hierarchy:
amqp-client-4.0.2.jar
The RabbitMQ Java client library allows Java applications to interface with RabbitMQ.
Library home page: http://www.rabbitmq.com
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/rabbitmq/amqp-client/4.0.2/amqp-client-4.0.2.jar
Dependency Hierarchy:
spring-rabbit-1.7.1.RELEASE.jar
Spring RabbitMQ Support
Library home page: https://projects.spring.io/spring-amqp
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/amqp/spring-rabbit/1.7.1.RELEASE/spring-rabbit-1.7.1.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 2c2c9f752b1dec579a12ba0bcc3d8dab738d7cff
Found in base branch: vp-rem
Vulnerability Details
Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit.
Publish Date: 2018-09-11
URL: CVE-2018-11087
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-11087
Release Date: 2018-09-11
Fix Resolution (org.springframework.amqp:spring-amqp): 1.7.10.RELEASE
Direct dependency fix Resolution (org.springframework.amqp:spring-rabbit): 1.7.10.RELEASE
Fix Resolution (com.rabbitmq:amqp-client): 1.7.10.RELEASE
Direct dependency fix Resolution (org.springframework.amqp:spring-rabbit): 1.7.2.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: