First published: Wed Jan 27 2021(Updated: )
While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache ActiveMQ Artemis | =2.15.0 | |
NetApp OnCommand Workflow Automation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26118 is a vulnerability that allows the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 to bypass policy based access control.
CVE-2021-26118 affects Apache ActiveMQ Artemis 2.15.0 by allowing the creation of advisory messages without proper access control.
CVE-2021-26118 has a severity rating of 7.5 (High).
To fix CVE-2021-26118, you should upgrade to Apache ActiveMQ Artemis 2.16.0 or a later version.
You can find more information about CVE-2021-26118 on the NIST National Vulnerability Database (NVD) website.