跳转到帖子

Apache ActiveMQ: CVE-2023-46604: Unbounded deserialization causes ActiveMQ Classic to be vulnerable to a remote code execution (RCE) attack

recommended_posts

发布于
  • Members

Apache ActiveMQ: CVE-2023-46604: Unbounded deserialization causes ActiveMQ Classic to be vulnerable to a remote code execution (RCE) attack

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:P/I:C/A:C)
Published
10/27/2023
Created
11/01/2023
Added
11/01/2023
Modified
01/20/2025

Description

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

Solution(s)

  • apache-activemq-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-46604
  • CVE - 2023-46604
  • http://seclists.org/fulldisclosure/2024/Apr/18
  • https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt
  • https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html
  • https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
  • https://security.netapp.com/advisory/ntap-20231110-0010/
  • https://www.openwall.com/lists/oss-security/2023/10/27/5
View more
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…