This is an automated email from the ASF dual-hosted git repository. jbonofre pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/activemq-website.git
The following commit(s) were added to refs/heads/main by this push: new d613435fa Announce CVE-2022-41678 d613435fa is described below commit d613435fabe318df22be375fe29ea100c957a0b2 Author: JB Onofré <jbono...@apache.org> AuthorDate: Tue Nov 28 15:45:20 2023 +0100 Announce CVE-2022-41678 --- .../CVE-2022-41678-announcement.txt | 44 ++++++++++++++++++++++ 1 file changed, 44 insertions(+) diff --git a/src/security-advisories.data/CVE-2022-41678-announcement.txt b/src/security-advisories.data/CVE-2022-41678-announcement.txt new file mode 100644 index 000000000..e2e1a4a8b --- /dev/null +++ b/src/security-advisories.data/CVE-2022-41678-announcement.txt @@ -0,0 +1,44 @@ +Deserialization vulnerability on Jolokia that allows authenticated users to perform Remote Code Execution (CVE-2022-41678) +PRODUCT AFFECTED: +This issue affects Apache ActiveMQ. + +PROBLEM: +Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution. + +In details, in ActiveMQ configurations, jetty allows +org.jolokia.http.AgentServlet to handler request to /api/jolokia + +org.jolokia.http.HttpRequestHandler#handlePostRequest is able to +create JmxRequest through JSONObject. And calls to +org.jolokia.http.HttpRequestHandler#executeRequest. + +Into deeper calling stacks, +org.jolokia.handler.ExecHandler#doHandleRequest is able to invoke +through refection. + +And then, RCE is able to be achieved via +jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11. + +1 Call newRecording. + +2 Call setConfiguration. And a webshell data hides in it. + +3 Call startRecording. + +4 Call copyTo method. The webshell will be written to a .jsp file. + +The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia. +A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0. + +This issue is being tracked as AMQ-9201 + +WORKAROUND: + +Upgrade to Apache ActiveMQ 5.16.6, 5.17.4, 5.18.0, 6.0.0. + +Credit: + +Apache ActiveMQ would like to thank wang...@threatbook.cn, wangzhend...@threatbook.cn, honglongl...@threatbook.cn for reporting this issue. + +RELATED LINKS: +CVE-2022-41678 at cve.mitre.org