CVE-2023-46120: RabbitMQ Java client's Lack of Message Size Limitation leads to Remote DoS Attack
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.61201%
CWE
Published
10/24/2023
Updated
11/5/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.rabbitmq:amqp-client | maven | < 5.18.0 | 5.18.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing message size checks during frame/message processing. The patch introduced maxInboundMessageBodySize validation in these critical path functions:
- CommandAssembler.consumeHeaderFrame added explicit body size check
- Frame.readFrom added payload size validation
- SocketFrameHandler propagates size limit to frame reading
- AMQCommand constructors now enforce size limits via CommandAssembler
- AMQChannel initializes commands with size constraints These functions directly handled message ingestion without size restrictions pre-patch, making them root causes of the OOM vulnerability.