Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <63E9EEC8-9E07-4CE5-B5EE-406FAFFBC1F4@nanthrax.net>
Date: Thu, 10 Sep 2020 11:45:14 +0200
From: Jean-Baptiste Onofre <jb@...thrax.net>
To: oss-security@...ts.openwall.com
Subject: [CVE-2020-11998] Apache ActiveMQ JMX remote client could execute
 arbitrary code

CVE-2020-11998: Apache ActiveMQ JMX remote client could execute arbitrary code

Severity: Moderate

Vendor: The Apache Software Foundation

Affected Version: only Apache ActiveMQ 5.15.12

Vulnerability details: 
A regression has been introduced in the commit preventing JMX re-bind.
By passing an empty environment map to RMIConnectorServer, instead of the map that contains
he authentication credentials, it leaves ActiveMQ open to the following attack:

 https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html

"A remote client could create a javax.management.loading.MLet MBean and use
it to create new MBeans from arbitrary URLs, at least if there is no
security manager. In other words, a rogue remote client could make your
Java application execute arbitrary code."

Mitigation: Upgrade to Apache ActiveMQ 5.15.13

Credit: Jonathan Gallimore & Colm O hEigeartaigh

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.