QID 379167
Date Published: 2023-12-28
QID 379167: Apache ActiveMQ Authenticated Remote Code Execution (RCE) Vulnerability (7g17kwbtjl011mm4tr8bn1vnoq9wh4sl)
Apache ActiveMQ is a popular open source, multi-protocol, Java-based message broker.
CVE-2022-41678: Apache ActiveMQ is vulnerable to arbitrary code execution vulnerability if an user is authenticated on Jolokia.
Affected versions:
Apache ActiveMQ before 5.16.6
Apache ActiveMQ 5.17.0 before 5.17.4
QID Detection Logic (Unauthenticated):
This QID tries to get the Apache ActiveMQ versions from admin/index.jsp pages if the target allows unauthenticated or default username/password (admin/admin) access to the admin directory.
This QID can only detect Apache ActiveMQ installations that expose the admin directory without authentication or default username/password (admin/admin).
QID Detection Logic (Linux Authenticated):
This QID checks for Apache ActiveMQ version by running the 'activemq --version' command. Please note that the activemq bin directory needs to be in the PATH environment variable for the detection to work.
QID Detection Logic (Windows Authenticated):
This QID checks for Apache ActiveMQ version in the running processes. Please note that Apache ActiveMQ is shipped in a zip archive and can be run from any directory. This QID can only detect Apache ActiveMQ installations that expose the version in running processes.
Successful exploitation on this vulnerability may allow authenticated attacker on Jolokia to execute arbitrary code on the target system.
Workaround:
The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia. Further details can be found on Apache ActiveMQ Security Advisory.
- Apache ActiveMQ Security Advisory -
activemq.apache.org/security-advisories.data/CVE-2022-41678-announcement.txt
CVEs related to QID 379167
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Apache ActiveMQ Security Advisory |
|