Lucene search

K
githubGitHub Advisory DatabaseGHSA-CRG9-44H2-XW35
HistoryOct 27, 2023 - 3:30 p.m.

Apache ActiveMQ is vulnerable to Remote Code Execution

2023-10-2715:30:20
CWE-502
GitHub Advisory Database
github.com
34
apache activemq
remote code execution
vulnerability
network access
upgrade
openwire protocol

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

8 High

AI Score

Confidence

Low

0.964 High

EPSS

Percentile

99.6%

Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.

Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.

Affected configurations

Vulners
Node
apacheactivemq_legacy_openwire_moduleRange<5.18.3
OR
apacheactivemq_legacy_openwire_moduleRange<5.17.6
OR
apacheactivemq_legacy_openwire_moduleRange<5.16.7
OR
apacheactivemq_legacy_openwire_moduleRange<5.15.16
OR
org.apache.activemq\activemqMatchclient
OR
org.apache.activemq\activemqMatchclient
OR
org.apache.activemq\activemqMatchclient
OR
org.apache.activemq\activemqMatchclient

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

8 High

AI Score

Confidence

Low

0.964 High

EPSS

Percentile

99.6%