cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-50780,https://securityvulnerability.io/vulnerability/CVE-2023-50780,Arbitrary File Write Vulnerability in ActiveMQ Artemis Could Lead to RCE,"The vulnerability in Apache ActiveMQ Artemis originates from the unauthorized exposure of diagnostic information and control mechanisms through MBeans, particularly accessible via the authenticated Jolokia endpoint. Prior to version 2.29.0, the Log4J2 MBean was also part of this exposure, which is not intended for non-administrative user access. An authenticated attacker can leverage this situation to write arbitrary files to the filesystem, paving the way for potential remote code execution. It is strongly recommended that users upgrade to version 2.29.0 or later to mitigate this risk.",Apache,Apache ActiveMQ Artemis,8.8,HIGH,0.0006500000017695129,false,,false,false,true,2024-12-18T07:07:24.000Z,true,false,false,,2024-10-14T16:03:38.321Z,0 CVE-2024-32114,https://securityvulnerability.io/vulnerability/CVE-2024-32114,Default Configuration Flaw Exposes ActiveMQ Broker to Unauthorized Access,"In Apache ActiveMQ versions prior to 6.1.2, the default security configuration fails to secure key API endpoints, specifically the Jolokia JMX REST API and the Message REST API. This lack of authentication enables unauthorized users to access sensitive functionalities, allowing potential manipulation of the broker's operations, including message production, consumption, and destination deletion. To prevent unauthorized access, it is crucial to update the conf/jetty.xml configuration file to enforce authentication or upgrade to version 6.1.2 where security measures are implemented by default.",Apache,Apache ActiveMQ,8.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-02T08:29:18.219Z,0 CVE-2022-41678,https://securityvulnerability.io/vulnerability/CVE-2022-41678,Apache ActiveMQ: Insufficient API restrictions on Jolokia allow authenticated users to perform RCE,"An vulnerability exists in ActiveMQ due to improper handling of requests via Jolokia, which allows authenticated users to trigger arbitrary code execution. By manipulating JMX requests through the ExecHandler, it becomes possible for an attacker to execute arbitrary code by using unrestricted deserialization methods available in certain Java versions. This could potentially lead to the deployment of web shells that compromise the server. It is crucial for users to apply stricter configurations or disable Jolokia to mitigate this risk, specifically in ActiveMQ distributions version 5.16.6, 5.17.4, 5.18.0, and 6.0.0.",Apache,Apache ActiveMQ,8.8,HIGH,0.011459999717772007,false,,false,false,true,2024-11-29T05:48:21.000Z,true,false,false,,2023-11-28T15:08:38.338Z,0 CVE-2023-46604,https://securityvulnerability.io/vulnerability/CVE-2023-46604,Remote Code Execution Vulnerability Affects Java OpenWire Protocol Marshaller,"The Java OpenWire protocol marshaller in Apache ActiveMQ is susceptible to a remote code execution vulnerability, allowing attackers with network access to execute arbitrary shell commands. By manipulating serialized class types in the OpenWire protocol, an attacker can cause the client or broker to instantiate any class located on the classpath. This vulnerability affects both brokers and clients, underscoring the importance of timely updates to versions 5.15.16, 5.16.7, 5.17.6, or 5.18.3 to mitigate the associated risks.",Apache,"Apache ActiveMQ,Apache ActiveMQ Legacy Openwire Module",10,CRITICAL,0.9700599908828735,true,2023-11-02T00:00:00.000Z,true,true,true,2023-11-02T00:00:00.000Z,true,false,false,,2023-10-27T15:15:00.000Z,167 CVE-2022-35278,https://securityvulnerability.io/vulnerability/CVE-2022-35278,HTML Injection in ActiveMQ Artemis Web Console,"In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue.",Apache,Apache ActiveMQ Artemis,6.1,MEDIUM,0.0029100000392645597,false,,false,false,false,,,false,false,,2022-08-23T00:00:00.000Z,0 CVE-2022-23913,https://securityvulnerability.io/vulnerability/CVE-2022-23913,Apache ActiveMQ Artemis DoS,"In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.",Apache,Apache ActiveMQ Artemis,7.5,HIGH,0.0013599999947473407,false,,false,false,false,,,false,false,,2022-02-04T22:33:01.000Z,0 CVE-2020-13947,https://securityvulnerability.io/vulnerability/CVE-2020-13947,,An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0.,Apache,Apache ActiveMQ,6.1,MEDIUM,0.01334999967366457,false,,false,false,false,,,false,false,,2021-02-08T21:25:27.000Z,0 CVE-2021-26118,https://securityvulnerability.io/vulnerability/CVE-2021-26118,Flaw in ActiveMQ Artemis OpenWire support,While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.,Apache,Apache ActiveMQ Artemis,7.5,HIGH,0.0023300000466406345,false,,false,false,false,,,false,false,,2021-01-27T18:55:13.000Z,0 CVE-2021-26117,https://securityvulnerability.io/vulnerability/CVE-2021-26117,ActiveMQ: LDAP-Authentication does not verify passwords on servers with anonymous bind,"The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.",Apache,Apache ActiveMQ,7.5,HIGH,0.001610000035725534,false,,false,false,false,,,false,false,,2021-01-27T00:00:00.000Z,0 CVE-2020-11998,https://securityvulnerability.io/vulnerability/CVE-2020-11998,,"A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html ""A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code."" Mitigation: Upgrade to Apache ActiveMQ 5.15.13",Apache,Apache ActiveMQ,9.8,CRITICAL,0.004470000043511391,false,,false,false,false,,,false,false,,2020-09-10T18:10:22.000Z,0 CVE-2020-13920,https://securityvulnerability.io/vulnerability/CVE-2020-13920,,"Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the ""jmxrmi"" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.",Apache,Apache ActiveMQ,5.9,MEDIUM,0.004259999841451645,false,,false,false,false,,,false,false,,2020-09-10T00:00:00.000Z,0 CVE-2020-13932,https://securityvulnerability.io/vulnerability/CVE-2020-13932,,"In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.",Apache,Apache ActiveMQ Artemis,6.1,MEDIUM,0.005400000140070915,false,,false,false,false,,,false,false,,2020-07-20T21:08:34.000Z,0 CVE-2020-1941,https://securityvulnerability.io/vulnerability/CVE-2020-1941,,"In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.",Apache,Apache ActiveMQ,6.1,MEDIUM,0.0036800000816583633,false,,false,false,false,,,false,false,,2020-05-14T16:29:26.000Z,0 CVE-2015-7559,https://securityvulnerability.io/vulnerability/CVE-2015-7559,,It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.,Apache,ActiveMQ,2.7,LOW,0.0005799999926239252,false,,false,false,false,,,false,false,,2019-08-01T00:00:00.000Z,0 CVE-2019-0222,https://securityvulnerability.io/vulnerability/CVE-2019-0222,,"In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.",Apache,Apache ActiveMQ,7.5,HIGH,0.006049999967217445,false,,false,false,false,,,false,false,,2019-03-28T21:16:12.000Z,0 CVE-2018-8006,https://securityvulnerability.io/vulnerability/CVE-2018-8006,,An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.,Apache,Apache ActiveMQ,6.1,MEDIUM,0.3603000044822693,false,,false,false,false,,,false,false,,2018-10-10T00:00:00.000Z,0 CVE-2018-11775,https://securityvulnerability.io/vulnerability/CVE-2018-11775,,TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.,Apache,Apache ActiveMQ,7.4,HIGH,0.003329999977722764,false,,false,false,false,,,false,false,,2018-09-10T00:00:00.000Z,0 CVE-2017-15709,https://securityvulnerability.io/vulnerability/CVE-2017-15709,,When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text.,Apache,Apache ActiveMQ,3.7,LOW,0.0018100000452250242,false,,false,false,false,,,false,false,,2018-02-13T00:00:00.000Z,0 CVE-2016-6810,https://securityvulnerability.io/vulnerability/CVE-2016-6810,,"In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.",Apache,Apache ActiveMQ,6.1,MEDIUM,0.003599999938160181,false,,false,false,false,,,false,false,,2018-01-10T15:29:00.000Z,0 CVE-2014-3600,https://securityvulnerability.io/vulnerability/CVE-2014-3600,,XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages.,Apache,ActiveMQ,9.8,CRITICAL,0.004449999891221523,false,,false,false,false,,,false,false,,2017-10-27T19:00:00.000Z,0 CVE-2014-3579,https://securityvulnerability.io/vulnerability/CVE-2014-3579,,XML external entity (XXE) vulnerability in Apache ActiveMQ Apollo 1.x before 1.7.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages.,Apache,ActiveMQ Apollo,9.8,CRITICAL,0.004449999891221523,false,,false,false,false,,,false,false,,2017-10-27T19:00:00.000Z,0 CVE-2016-4978,https://securityvulnerability.io/vulnerability/CVE-2016-4978,,"The getObject method of the javax.jms.ObjectMessage class in the (1) JMS Core client, (2) Artemis broker, and (3) Artemis REST component in Apache ActiveMQ Artemis before 1.4.0 might allow remote authenticated users with permission to send messages to the Artemis broker to deserialize arbitrary objects and execute arbitrary code by leveraging gadget classes being present on the Artemis classpath.",Apache,ActiveMQ Artemis,7.2,HIGH,0.01157000008970499,false,,false,false,false,,,false,false,,2016-09-27T15:00:00.000Z,0 CVE-2016-0782,https://securityvulnerability.io/vulnerability/CVE-2016-0782,,"The administration web console in Apache ActiveMQ 5.x before 5.11.4, 5.12.x before 5.12.3, and 5.13.x before 5.13.2 allows remote authenticated users to conduct cross-site scripting (XSS) attacks and consequently obtain sensitive information from a Java memory dump via vectors related to creating a queue.",Apache,ActiveMQ,5.4,MEDIUM,0.0008699999889358878,false,,false,false,false,,,false,false,,2016-08-05T15:00:00.000Z,0 CVE-2016-3088,https://securityvulnerability.io/vulnerability/CVE-2016-3088,,The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.,Apache,ActiveMQ,9.8,CRITICAL,0.9606999754905701,true,2022-02-10T00:00:00.000Z,false,false,true,2020-07-31T09:06:15.000Z,true,false,false,,2016-06-01T20:00:00.000Z,0 CVE-2016-0734,https://securityvulnerability.io/vulnerability/CVE-2016-0734,,"The web-based administration console in Apache ActiveMQ 5.x before 5.13.2 does not send an X-Frame-Options HTTP header, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web page that contains a (1) FRAME or (2) IFRAME element.",Apache,ActiveMQ,6.1,MEDIUM,0.0024300001095980406,false,,false,false,false,,,false,false,,2016-04-07T19:00:00.000Z,0