Vulnerability Details CVE-2020-36282
JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.017
EPSS Ranking 81.5%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2020-36282
-
cpe:2.3:a:rabbitmq:jms_client:1.0.0
-
cpe:2.3:a:rabbitmq:jms_client:1.0.1
-
cpe:2.3:a:rabbitmq:jms_client:1.0.2
-
cpe:2.3:a:rabbitmq:jms_client:1.0.3
-
cpe:2.3:a:rabbitmq:jms_client:1.0.4
-
cpe:2.3:a:rabbitmq:jms_client:1.0.5
-
cpe:2.3:a:rabbitmq:jms_client:1.0.6
-
cpe:2.3:a:rabbitmq:jms_client:1.1.0
-
cpe:2.3:a:rabbitmq:jms_client:1.1.1
-
cpe:2.3:a:rabbitmq:jms_client:1.1.2
-
cpe:2.3:a:rabbitmq:jms_client:1.1.3
-
cpe:2.3:a:rabbitmq:jms_client:1.1.4
-
cpe:2.3:a:rabbitmq:jms_client:1.10.0
-
cpe:2.3:a:rabbitmq:jms_client:1.11.0
-
cpe:2.3:a:rabbitmq:jms_client:1.11.1
-
cpe:2.3:a:rabbitmq:jms_client:1.11.2
-
cpe:2.3:a:rabbitmq:jms_client:1.12.0
-
cpe:2.3:a:rabbitmq:jms_client:1.13.0
-
cpe:2.3:a:rabbitmq:jms_client:1.14.0
-
cpe:2.3:a:rabbitmq:jms_client:1.15.0
-
cpe:2.3:a:rabbitmq:jms_client:1.15.1
-
cpe:2.3:a:rabbitmq:jms_client:1.2.0
-
cpe:2.3:a:rabbitmq:jms_client:1.2.1
-
cpe:2.3:a:rabbitmq:jms_client:1.2.3
-
cpe:2.3:a:rabbitmq:jms_client:1.2.4
-
cpe:2.3:a:rabbitmq:jms_client:1.2.5
-
cpe:2.3:a:rabbitmq:jms_client:1.3.1
-
cpe:2.3:a:rabbitmq:jms_client:1.3.2
-
cpe:2.3:a:rabbitmq:jms_client:1.3.3
-
cpe:2.3:a:rabbitmq:jms_client:1.3.4
-
cpe:2.3:a:rabbitmq:jms_client:1.4.1
-
cpe:2.3:a:rabbitmq:jms_client:1.4.4
-
cpe:2.3:a:rabbitmq:jms_client:1.4.6
-
cpe:2.3:a:rabbitmq:jms_client:1.4.7
-
cpe:2.3:a:rabbitmq:jms_client:1.5.0
-
cpe:2.3:a:rabbitmq:jms_client:1.6.0
-
cpe:2.3:a:rabbitmq:jms_client:1.7.0
-
cpe:2.3:a:rabbitmq:jms_client:1.8.0
-
cpe:2.3:a:rabbitmq:jms_client:1.8.1
-
cpe:2.3:a:rabbitmq:jms_client:1.9.0
-
cpe:2.3:a:rabbitmq:jms_client:2.0.0
-
cpe:2.3:a:rabbitmq:jms_client:2.1.0
-
cpe:2.3:a:rabbitmq:jms_client:2.1.1