This is an automated email from the ASF dual-hosted git repository.

jbonofre pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/main by this push:
     new d613435fa Announce CVE-2022-41678
d613435fa is described below

commit d613435fabe318df22be375fe29ea100c957a0b2
Author: JB Onofré <jbono...@apache.org>
AuthorDate: Tue Nov 28 15:45:20 2023 +0100

    Announce CVE-2022-41678
---
 .../CVE-2022-41678-announcement.txt                | 44 ++++++++++++++++++++++
 1 file changed, 44 insertions(+)

diff --git a/src/security-advisories.data/CVE-2022-41678-announcement.txt 
b/src/security-advisories.data/CVE-2022-41678-announcement.txt
new file mode 100644
index 000000000..e2e1a4a8b
--- /dev/null
+++ b/src/security-advisories.data/CVE-2022-41678-announcement.txt
@@ -0,0 +1,44 @@
+Deserialization vulnerability on Jolokia that allows authenticated users to 
perform Remote Code Execution (CVE-2022-41678)
+PRODUCT AFFECTED:
+This issue affects Apache ActiveMQ.
+
+PROBLEM:
+Once an user is authenticated on Jolokia, he can potentially trigger arbitrary 
code execution.
+
+In details, in ActiveMQ configurations, jetty allows
+org.jolokia.http.AgentServlet to handler request to /api/jolokia
+
+org.jolokia.http.HttpRequestHandler#handlePostRequest is able to
+create JmxRequest through JSONObject. And calls to
+org.jolokia.http.HttpRequestHandler#executeRequest.
+
+Into deeper calling stacks,
+org.jolokia.handler.ExecHandler#doHandleRequest is able to invoke
+through refection.
+
+And then, RCE is able to be achieved via
+jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 
11.
+
+1 Call newRecording.
+
+2 Call setConfiguration. And a webshell data hides in it.
+
+3 Call startRecording.
+
+4 Call copyTo method. The webshell will be written to a .jsp file.
+
+The mitigation is to restrict (by default) the actions authorized on Jolokia, 
or disable Jolokia.
+A more restrictive Jolokia configuration has been defined in default ActiveMQ 
distribution. We encourage users to upgrade to ActiveMQ distributions version 
including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
+
+This issue is being tracked as AMQ-9201 
+
+WORKAROUND:
+
+Upgrade to Apache ActiveMQ 5.16.6, 5.17.4, 5.18.0, 6.0.0.
+
+Credit:
+
+Apache ActiveMQ would like to thank wang...@threatbook.cn, 
wangzhend...@threatbook.cn, honglongl...@threatbook.cn for reporting this issue.
+
+RELATED LINKS:
+CVE-2022-41678 at cve.mitre.org

Reply via email to