### [CVE-2017-8045](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8045) ![](https://img.shields.io/static/v1?label=Product&message=Spring%20AMQP%20Spring%20AMQP%20versions%20prior%20to%201.7.4%2C%201.6.11%2C%20and%201.5.7&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen) ### Description In Pivotal Spring AMQP versions prior to 1.7.4, 1.6.11, and 1.5.7, an org.springframework.amqp.core.Message may be unsafely deserialized when being converted into a string. A malicious payload could be crafted to exploit this and enable a remote code execution attack. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Cryin/Paper - https://github.com/Flipkart-Grid-4-0-CyberSec-Hack/Backend - https://github.com/SecureSkyTechnology/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095 - https://github.com/ax1sX/Automation-in-Java-Security - https://github.com/ax1sX/Codeql-In-Java-Security - https://github.com/langu-xyz/JavaVulnMap