Remote code execution in Apache ActiveMQ
Critical severity
GitHub Reviewed
Published
Feb 9, 2022
to the GitHub Advisory Database
•
Updated Mar 14, 2024
Package
Affected versions
= 5.15.12
Patched versions
5.15.13
Description
Published by the National Vulnerability Database
Sep 10, 2020
Reviewed
Apr 5, 2021
Published to the GitHub Advisory Database
Feb 9, 2022
Last updated
Mar 14, 2024
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13
References