logo

CVE-2020-13920 org.apache.activemq:activemq-parent

Package

Manager: maven
Name: org.apache.activemq:activemq-parent
Vulnerable Version: >=0 <5.15.12

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00207 pctl0.43209

Details

Improper Authentication in Apache ActiveMQ Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.

Metadata

Created: 2022-02-09T22:15:00Z
Modified: 2024-03-14T21:54:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-xgrx-xpv2-6vp4/GHSA-xgrx-xpv2-6vp4.json
CWE IDs: ["CWE-306"]
Alternative ID: GHSA-xgrx-xpv2-6vp4
Finding: F006
Auto approve: 1