Vigil@nce - Vigil@nce - RabbitMQ JMS Client: code execution via StreamMessage Deserialization, analyzed on 18/06/2021
August 2021 by Vigil@nce
Vigil@nce - An attacker can use a vulnerability via StreamMessage Deserialization of RabbitMQ JMS Client, in order to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/RabbitMQ-JMS-Client-code-execution-via-StreamMessage-Deserialization-35721