Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-34050 PoC — Spring AMQP Deserialization Vulnerability

Source
Associated Vulnerability
Title:Spring AMQP Deserialization Vulnerability (CVE-2023-34050)
Description: In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content
Description
A Proof of Concept of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)
Readme
# spring-amqp-deserialization

A Proof of Concept of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)

Affected versions:
- 1.0.0 to 2.4.16
- 3.0.0 to 3.0.9

Reference: [https://spring.io/security/cve-2023-34050](https://spring.io/security/cve-2023-34050)
File Snapshot

[4.0K] /data/pocs/51ad04eb3741a9dab87ea39eb3f55e4db3d4e550 ├── [4.0K] client │   ├── [ 11K] mvnw │   ├── [7.4K] mvnw.cmd │   ├── [1.5K] pom.xml │   └── [4.0K] src │   └── [4.0K] main │   ├── [4.0K] java │   │   └── [4.0K] com │   │   ├── [4.0K] example │   │   │   └── [4.0K] client │   │   │   ├── [2.1K] ClientApplication.java │   │   │   ├── [1.8K] Gadgets.java │   │   │   └── [ 618] Reflections.java │   │   └── [4.0K] fasterxml │   │   └── [4.0K] jackson │   │   └── [4.0K] databind │   │   └── [4.0K] node │   │   └── [4.3K] BaseJsonNode.java │   └── [4.0K] resources │   └── [ 112] application.yml ├── [ 647] pom.xml ├── [ 265] README.md └── [4.0K] server ├── [ 11K] mvnw ├── [7.4K] mvnw.cmd ├── [1.3K] pom.xml └── [4.0K] src └── [4.0K] main ├── [4.0K] java │   └── [4.0K] com │   └── [4.0K] example │   └── [4.0K] server │   ├── [ 374] QueueMessageListener.java │   └── [ 323] ServerApplication.java └── [4.0K] resources └── [ 137] application.yml 20 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →