Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.
Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/63b78shqz312phsx7v1ryr7jv7bprg58 | Issue Tracking Mailing List Vendor Advisory |
Configurations
History
16 Oct 2024, 14:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://lists.apache.org/thread/63b78shqz312phsx7v1ryr7jv7bprg58 - Issue Tracking, Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
First Time |
Apache activemq Artemis
Apache |
15 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Oct 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-14 16:15
Updated : 2024-10-16 14:01
NVD link : CVE-2023-50780
Mitre link : CVE-2023-50780
CVE.ORG link : CVE-2023-50780
JSON object : View
Products Affected
apache
- activemq_artemis
CWE