This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-site in repository https://gitbox.apache.org/repos/asf/activemq-website.git
The following commit(s) were added to refs/heads/asf-site by this push: new 6f646a43b Automatic Site Publish by Buildbot 6f646a43b is described below commit 6f646a43bf67143ce284e51c659158f7d405b27a Author: buildbot <us...@infra.apache.org> AuthorDate: Tue Nov 28 14:46:45 2023 +0000 Automatic Site Publish by Buildbot --- .../CVE-2022-41678-announcement.txt | 44 ++++++++++++++++++++++ 1 file changed, 44 insertions(+) diff --git a/output/security-advisories.data/CVE-2022-41678-announcement.txt b/output/security-advisories.data/CVE-2022-41678-announcement.txt new file mode 100644 index 000000000..e2e1a4a8b --- /dev/null +++ b/output/security-advisories.data/CVE-2022-41678-announcement.txt @@ -0,0 +1,44 @@ +Deserialization vulnerability on Jolokia that allows authenticated users to perform Remote Code Execution (CVE-2022-41678) +PRODUCT AFFECTED: +This issue affects Apache ActiveMQ. + +PROBLEM: +Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution. + +In details, in ActiveMQ configurations, jetty allows +org.jolokia.http.AgentServlet to handler request to /api/jolokia + +org.jolokia.http.HttpRequestHandler#handlePostRequest is able to +create JmxRequest through JSONObject. And calls to +org.jolokia.http.HttpRequestHandler#executeRequest. + +Into deeper calling stacks, +org.jolokia.handler.ExecHandler#doHandleRequest is able to invoke +through refection. + +And then, RCE is able to be achieved via +jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11. + +1 Call newRecording. + +2 Call setConfiguration. And a webshell data hides in it. + +3 Call startRecording. + +4 Call copyTo method. The webshell will be written to a .jsp file. + +The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia. +A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0. + +This issue is being tracked as AMQ-9201 + +WORKAROUND: + +Upgrade to Apache ActiveMQ 5.16.6, 5.17.4, 5.18.0, 6.0.0. + +Credit: + +Apache ActiveMQ would like to thank wang...@threatbook.cn, wangzhend...@threatbook.cn, honglongl...@threatbook.cn for reporting this issue. + +RELATED LINKS: +CVE-2022-41678 at cve.mitre.org