Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-13920

Опубликовано: 10 сент. 2020
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat AMQ Broker 7mqtt-clientNot affected
Red Hat CodeReady Studio 12activemqAffected
Red Hat Decision Manager 7activemq-artemisNot affected
Red Hat JBoss A-MQ 6activemqOut of support scope
Red Hat JBoss Data Grid 7activemq-artemisNot affected
Red Hat JBoss Enterprise Application Platform 7activemq-artemisNot affected
Red Hat JBoss Enterprise Application Platform Continuous Deliveryactivemq-artemisOut of support scope
Red Hat JBoss Fuse 6activemqOut of support scope
Red Hat JBoss Fuse Service Works 6activemqOut of support scope
Red Hat Process Automation 7activemq-artemisNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1880101activemq: improper authentication allows MITM attack

EPSS

Процентиль: 36%
0.00153
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 5 лет назад

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.

CVSS3: 5.9
nvd
больше 5 лет назад

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.

CVSS3: 5.9
debian
больше 5 лет назад

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX ...

CVSS3: 5.9
github
почти 4 года назад

Improper Authentication in Apache ActiveMQ

EPSS

Процентиль: 36%
0.00153
Низкий

5.9 Medium

CVSS3