| { |
| "schema_version": "1.4.0", |
| "id": "GHSA-wqfh-9m4g-7x6x", |
| "modified": "2024-03-14T21:56:27Z", |
| "published": "2022-02-09T22:14:58Z", |
| "aliases": [ |
| "CVE-2020-11998" |
| ], |
| "summary": "Remote code execution in Apache ActiveMQ", |
| "details": "A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13", |
| "severity": [ |
| { |
| "type": "CVSS_V3", |
| "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" |
| } |
| ], |
| "affected": [ |
| { |
| "package": { |
| "ecosystem": "Maven", |
| "name": "org.apache.activemq:activemq-parent" |
| }, |
| "ranges": [ |
| { |
| "type": "ECOSYSTEM", |
| "events": [ |
| { |
| "introduced": "5.15.12" |
| }, |
| { |
| "fixed": "5.15.13" |
| } |
| ] |
| } |
| ], |
| "versions": [ |
| "5.15.12" |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "type": "ADVISORY", |
| "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11998" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://github.com/apache/activemq/commit/0d6e5f2" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://github.com/apache/activemq/commit/88b78d0" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://github.com/apache/activemq/commit/aa8900c" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://www.oracle.com//security-alerts/cpujul2021.html" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://www.oracle.com/security-alerts/cpujan2021.html" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" |
| }, |
| { |
| "type": "WEB", |
| "url": "http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt" |
| } |
| ], |
| "database_specific": { |
| "cwe_ids": [ |
| "CWE-94" |
| ], |
| "severity": "CRITICAL", |
| "github_reviewed": true, |
| "github_reviewed_at": "2021-04-05T23:02:39Z", |
| "nvd_published_at": "2020-09-10T19:15:00Z" |
| } |
| } |