|
|||
Rule General Information |
---|
Release Date: | 2023-10-27 | |
Rule Name: | Apache ActiveMQ Remote Code Execution Vulnerability (CVE-2023-46604) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | ActiveMQ is an open source message broker and integration pattern server that supports the Java Message Service (JMS) API. It is a project under the Apache Software Foundation that implements messaging middleware to help different applications or systems communicate with each other.A remote code execution vulnerability exists in Apache ActiveMQ 5.18.3 and below versions. Apache ActiveMQ opens the service port 61616 under the default installation, which does not properly filter incoming data, allowing an attacker to construct malicious data for remote code execution. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt http://www.openwall.com/lists/oss-security/2023/10/27/5 https://cxsecurity.com/cveshow/CVE-2023-46604/ |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt |