You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 3, 2024. It is now read-only.
It looks like the rabbimq amqp-client used by this library is vulnerable to DDoS attacks per CVE-2023-46120
The absence of maxBodyLength usage in handling Message objects allows potential attackers to exploit the system by sending oversized Messages, leading to a memory overflow and triggering an OOM Error.
This vulnerability exposes RabbitMQ users to potential DoS attacks through the RabbitMQ Java client, resulting in memory exhaustion for consumers. We kindly urge you to address this issue as soon as possible in your library by providing a patch for users to implement.
The text was updated successfully, but these errors were encountered:
TalonOnee
changed the title
amqp-client renders this library vulnerable to DDoS
amqp-client renders this library vulnerable to DDoS (CVE-2023-46120)
Nov 30, 2023
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
It looks like the rabbimq amqp-client used by this library is vulnerable to DDoS attacks per CVE-2023-46120
The absence of maxBodyLength usage in handling Message objects allows potential attackers to exploit the system by sending oversized Messages, leading to a memory overflow and triggering an OOM Error.
This vulnerability exposes RabbitMQ users to potential DoS attacks through the RabbitMQ Java client, resulting in memory exhaustion for consumers. We kindly urge you to address this issue as soon as possible in your library by providing a patch for users to implement.
More details here: GHSA-mm8h-8587-p46h
The text was updated successfully, but these errors were encountered: