Hi Marian-

This appears to be a standard “if the server gets compromised, bad actors can 
do other bad things” security issue.

Deserialization (in many programming languages) can always lead to security 
problems if a bad actor is able to compromise the system by deploying malicious 
code. Keep in mind this requires a bad actor to install malicious code on the 
server, and restart the ActiveMQ process. 

If they can do all that, they already have compromised the system.

Hope this helps.

-Matt Pavlovich

> On Aug 1, 2023, at 6:57 AM, Marian Stanciu <marian.stan...@tufin.com> wrote:
> 
> Hi,
> 
> We are using a docker container of ActiveMQ 5.17.0 and our vulnerability 
> scanner found the library spring-web-5.3.16.jar which is vulnerable to 
> cve-2016-1000027.
> 
> Can you confirm/infirm if Active MQ is affected / whether it uses a Spring 
> remoting endpoint?
> 
> More details about this vulnerability:
> Pivotal Spring Framework through 5.3.16 suffers from a potential remote code 
> execution (RCE) issue if used for Java deserialization of untrusted data. 
> Depending on how the library is implemented within a product, this issue may 
> or not occur, and authentication may be required. NOTE: the vendor's position 
> is that untrusted data is not an intended use case. The product's behavior 
> will not be changed because some users rely on deserialization of trusted 
> data.
> 
> https://nvd.nist.gov/vuln/detail/cve-2016-1000027
> 
> Thank you!

Reply via email to