Vulnerability Details CVE-2021-22097
In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 68.0%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 6.8
Products affected by CVE-2021-22097
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.0
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.1
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.2
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.3
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.4
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.5
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.6
-
cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:2.2.7