Lucene search

K
nvd[email protected]NVD:CVE-2023-46604
HistoryOct 27, 2023 - 3:15 p.m.

CVE-2023-46604

2023-10-2715:15:14
CWE-502
web.nvd.nist.gov
2
java
openwire protocol
remote code execution
vulnerability
upgrade

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%

The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with network
access to either a Java-based OpenWire broker or client to run arbitrary
shell commands by manipulating serialized class types in the OpenWire
protocol to cause either the client or the broker (respectively) to
instantiate any class on the classpath.

Users are recommended to upgrade
both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3
which fixes this issue.

Affected configurations

NVD
Node
apacheactivemqRange<5.15.16
OR
apacheactivemqRange5.16.0โ€“5.16.7
OR
apacheactivemqRange5.17.0โ€“5.17.6
OR
apacheactivemqRange5.18.0โ€“5.18.3
Node
apacheactivemq_legacy_openwire_moduleRange<5.15.16
OR
apacheactivemq_legacy_openwire_moduleRange5.16.0โ€“5.16.7
OR
apacheactivemq_legacy_openwire_moduleRange5.17.0โ€“5.17.6
OR
apacheactivemq_legacy_openwire_moduleRange5.18.0โ€“5.18.3
Node
debiandebian_linuxMatch10.0
Node
netappe-series_santricity_unified_managerMatch-
OR
netappe-series_santricity_web_services_proxyMatch-
OR
netappsantricity_storage_pluginMatch-vcenter

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%