First published: Tue Nov 28 2023(Updated: )
Apache ActiveMQ could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the Jolokia component. By sending specially crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Secure Proxy | <=6.0.3 | |
IBM Secure Proxy | <=6.1.0 | |
Apache ActiveMQ | <5.16.6 | |
Apache ActiveMQ | >=5.17.0<5.17.4 | |
maven/org.apache.activemq:apache-activemq | >=5.17.0<5.17.4 | 5.17.4 |
maven/org.apache.activemq:apache-activemq | <5.16.6 | 5.16.6 |
debian/activemq | <=5.16.1-1<=5.17.2+dfsg-2 | 5.17.6+dfsg-1 |
redhat/activemq | <5.16.6 | 5.16.6 |
redhat/activemq | <5.17.4 | 5.17.4 |
redhat/activemq | <5.18.0 | 5.18.0 |
redhat/activemq | <6.0.0 | 6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-41678.
The title of this vulnerability is Apache ActiveMQ: Deserialization vulnerability on Jolokia that allows authenticated users to perform…
The severity level of CVE-2022-41678 is not specified in the provided information.
The vulnerability in Apache ActiveMQ allows authenticated users to potentially trigger arbitrary code execution through Jolokia.
CVE-2022-41678 affects Apache ActiveMQ versions 5.17.0 to 5.17.4 and 5.16.6.
To fix the vulnerability in Apache ActiveMQ, update to version 5.17.4 (for versions 5.17.0 to 5.17.4) or version 5.16.6 (for version 5.16.6).
More information about CVE-2022-41678 can be found in the provided references: [Link 1](https://activemq.apache.org/security-advisories.data/CVE-2022-41678-announcement.txt), [Link 2](https://lists.apache.org/thread/7g17kwbtjl011mm4tr8bn1vnoq9wh4sl), [Link 3](http://www.openwall.com/lists/oss-security/2023/11/28/1).