A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13
2020-09-10T19:15:13.083
2024-11-21T04:59:05.040
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | activemq | 5.15.12 | Yes |
Application | oracle | communications_diameter_signaling_router | ≤ 8.5.0 | Yes |
Application | oracle | communications_element_manager | ≤ 8.2.4.0 | Yes |
Application | oracle | communications_session_report_manager | ≤ 8.2.2 | Yes |
Application | oracle | communications_session_route_manager | ≤ 8.2.2 | Yes |
Application | oracle | enterprise_repository | 11.1.1.7.0 | Yes |
Application | oracle | flexcube_private_banking | 12.0.0 | Yes |
Application | oracle | flexcube_private_banking | 12.1.0 | Yes |