CVE-2023-50780 – org.apache.activemq:artemis-cli
Package
Manager: maven
Name: org.apache.activemq:artemis-cli
Vulnerable Version: >=0 <2.29.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00181 pctl0.4
Details
Apache ActiveMQ Artemis: Authenticated users could perform RCE via Jolokia MBeans Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE. Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.
Metadata
Created: 2024-10-14T18:30:25Z
Modified: 2025-03-20T19:02:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-443j-grxv-2pgv/GHSA-443j-grxv-2pgv.json
CWE IDs: ["CWE-285"]
Alternative ID: GHSA-443j-grxv-2pgv
Finding: F039
Auto approve: 1