CVE-2016-4974

Summary

CVECVE-2016-4974
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2016-07-13 15:59:00 UTC
Updated2018-10-09 20:00:00 UTC
DescriptionApache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.

Risk And Classification

Problem Types: CWE-20

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Apache Amqp 0-x Jms Client All All All All
Application Apache Jms Client Amqp All All All All

References

ReferenceSourceLinkTags
Security - Apache Qpid™ CONFIRM qpid.apache.org Vendor Advisory
Apache QPID CVE-2016-4974 Deserialization Security Bypass Vulnerability BID www.securityfocus.com Third Party Advisory, VDB Entry
Apache Qpid Untrusted Input Deserialization ≈ Packet Storm MISC packetstormsecurity.com Third Party Advisory, VDB Entry
SecurityFocus BUGTRAQ www.securityfocus.com
[QPIDJMS-188] [CVE-2016-4974] allow whitelisting trusted classes/packages for deserialization from ObjectMessage - ASF JIRA CONFIRM issues.apache.org Issue Tracking
Apache Qpid JMS ObjectMessage Deserialization Bug Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker SECTRACK www.securitytracker.com Third Party Advisory, VDB Entry
Security - Apache Qpid™ CONFIRM qpid.apache.org Vendor Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report