First published: Thu Apr 23 2020(Updated: )
A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ActiveMQ Artemis | <2.12.0 | 2.12.0 |
Apache ActiveMQ Artemis | >=2.7.0<=2.12.0 | |
NetApp OnCommand Workflow Automation |
When resetting a user an alternative is to use the broker instance CLI `/bin/artemis user reset` which is not affected by the flaw
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10727 is a vulnerability found in ActiveMQ Artemis management API versions 2.7.0 up until 2.12.0.
CVE-2020-10727 has a severity rating of 5.5, which is considered medium.
CVE-2020-10727 allows a local attacker to read the plaintext passwords stored in the Artemis shadow file.
ActiveMQ Artemis versions 2.7.0 up until 2.12.0 are affected by CVE-2020-10727.
To fix CVE-2020-10727, you should upgrade to ActiveMQ Artemis version 2.12.0 or later.