Apache ActiveMQ官网安全更新(2020-09-10)

情报来源:TSRC

发布时间:2020-09-10

基本信息
  • 发布日期2020-09-10
  • 感知时间2020-09-10
  • 漏洞类型安全更新
  • 风险等级中危
  • 更新版本 5.x
  • 情报贡献TSRC
更新标题

JMX remote client could execute arbitrary code

更新详情

CVE-2020-11998: Apache ActiveMQ JMX remote client could execute arbitrary code<br/><br/>Severity: Moderate<br/><br/>Vendor: The Apache Software Foundation<br/><br/>Affected Version: only Apache ActiveMQ 5.15.12<br/><br/>Vulnerability details: <br/>A regression has been introduced in the commit preventing JMX re-bind.<br/>By passing an empty environment map to RMIConnectorServer, instead of the map that contains<br/>he authentication credentials, it leaves ActiveMQ open to the following attack:<br/><br/> https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html<br/><br/>&#34;A remote client could create a javax.management.loading.MLet MBean and use<br/> it to create new MBeans from arbitrary URLs, at least if there is no<br/> security manager. In other words, a rogue remote client could make your<br/> Java application execute arbitrary code.&#34;<br/><br/>Mitigation: Upgrade to Apache ActiveMQ 5.15.13<br/><br/>Credit: Jonathan Gallimore &amp; Colm O hEigeartaigh<br/>

软件描述

Apache ActiveMQ是Apache软件基金会所研发的开放源代码消息中间件;由于ActiveMQ是一个纯Java程序,因此只需要操作系统支持Java虚拟机,ActiveMQ便可执行。

CVE编号

<p><a target="_blank" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11998">CVE-2020-11998</a></p>

Knowsafe分析

暂无

业界资讯

暂无

来源链接

http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt