Vulnerability Details : CVE-2023-32081
Vert.x STOMP is a vert.x implementation of the STOMP specification that provides a STOMP server and client. From versions 3.1.0 until 3.9.16 and 4.0.0 until 4.4.2, a Vert.x STOMP server processes client STOMP frames without checking that the client send an initial CONNECT frame replied with a successful CONNECTED frame. The client can subscribe to a destination or publish message without prior authentication. Any Vert.x STOMP server configured with an authentication handler is impacted. The issue is patched in Vert.x 3.9.16 and 4.4.2. There are no trivial workarounds.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-32081
- cpe:2.3:a:eclipse:vert.x_stomp:*:*:*:*:*:*:*:*
- cpe:2.3:a:eclipse:vert.x_stomp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-32081
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32081
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
3.9
|
2.5
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
3.9
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2023-32081
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-32081
-
https://github.com/vert-x3/vertx-stomp/security/advisories/GHSA-gvrq-cg5r-7chp
STOMP server process client frames that would not send initially a connect frame · Advisory · vert-x3/vertx-stomp · GitHubVendor Advisory
-
https://github.com/vert-x3/vertx-stomp/commit/0de4bc5a44ddb57e74d92c445f16456fa03f265b
STOMP server process client frames that would not send initially a co… · vert-x3/vertx-stomp@0de4bc5 · GitHubPatch
Jump to