### Reachability Analysis
This vulnerability is potentially reachable
```
com.visualpathit.account.service.ProducerServiceImpl (Application)
-> ❌ com.rabbitmq.client.ConnectionFactory (Vulnerable Component)
```
### Vulnerability Details
Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit.
Vulnerable Library - amqp-client-4.0.2.jar
The RabbitMQ Java client library allows Java applications to interface with RabbitMQ.
Library home page: http://www.rabbitmq.com
Path to dependency file: /pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/com/rabbitmq/amqp-client/4.0.2/amqp-client-4.0.2.jar
Found in HEAD commit: 66f6cec7b61b92e8af1c753e55af1f6e28648f07
Vulnerabilities
Reachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2018-11087
### Vulnerable Library - amqp-client-4.0.2.jarThe RabbitMQ Java client library allows Java applications to interface with RabbitMQ.
Library home page: http://www.rabbitmq.com
Path to dependency file: /pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/com/rabbitmq/amqp-client/4.0.2/amqp-client-4.0.2.jar
Dependency Hierarchy: - :x: **amqp-client-4.0.2.jar** (Vulnerable Library)
Found in HEAD commit: 66f6cec7b61b92e8af1c753e55af1f6e28648f07
Found in base branch: vp-rem
### Reachability Analysis This vulnerability is potentially reachable ``` com.visualpathit.account.service.ProducerServiceImpl (Application) -> ❌ com.rabbitmq.client.ConnectionFactory (Vulnerable Component) ``` ### Vulnerability DetailsPivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit.
Publish Date: 2018-09-14
URL: CVE-2018-11087
### CVSS 3 Score Details (5.9)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-11087
Release Date: 2018-09-14
Fix Resolution: 1.7.10.RELEASE,2.0.6.RELEASE
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.