Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-crg9-44h2-xw35

Опубликовано: 27 окт. 2023
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

Apache ActiveMQ is vulnerable to Remote Code Execution

Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. 

Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.

Пакеты

Наименование

org.apache.activemq:activemq-client

maven
Затронутые версииВерсия исправления

< 5.15.16

5.15.16

Наименование

org.apache.activemq:activemq-client

maven
Затронутые версииВерсия исправления

>= 5.16.0, < 5.16.7

5.16.7

Наименование

org.apache.activemq:activemq-client

maven
Затронутые версииВерсия исправления

>= 5.17.0, < 5.17.6

5.17.6

Наименование

org.apache.activemq:activemq-client

maven
Затронутые версииВерсия исправления

>= 5.18.0, < 5.18.3

5.18.3

Наименование

org.apache.activemq:activemq-openwire-legacy

maven
Затронутые версииВерсия исправления

>= 5.8.0, < 5.15.16

5.15.16

Наименование

org.apache.activemq:activemq-openwire-legacy

maven
Затронутые версииВерсия исправления

>= 5.16.0, < 5.16.7

5.16.7

Наименование

org.apache.activemq:activemq-openwire-legacy

maven
Затронутые версииВерсия исправления

>= 5.17.0, < 5.17.6

5.17.6

Наименование

org.apache.activemq:activemq-openwire-legacy

maven
Затронутые версииВерсия исправления

>= 5.18.0, < 5.18.3

5.18.3

EPSS

Процентиль: 100%
0.94436
Критический

10 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 10
ubuntu
около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 9.8
redhat
около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 10
nvd
около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 10
debian
около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Ex ...

CVSS3: 10
fstec
около 2 лет назад

Уязвимость программной платформы Apache ActiveMQ, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94436
Критический

10 Critical

CVSS3

Дефекты

CWE-502