Lucene search

K
githubGitHub Advisory DatabaseGHSA-GJ5M-M88J-V7C3
HistoryMay 02, 2024 - 9:30 a.m.

Apache ActiveMQ's default configuration doesn't secure the API web context

2024-05-0209:30:48
CWE-1188
GitHub Advisory Database
github.com
11
apache activemq
default configuration
api insecurity
authentication
jetty
security mitigation
update
apache activemq 6.1.2
software upgrade

8.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H

7.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

In Apache ActiveMQ 6.x, the default configuration doesnā€™t secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST API).

To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement:
<bean id=ā€œsecurityConstraintMappingā€ class=ā€œorg.eclipse.jetty.security.ConstraintMappingā€>
Ā  <property name=ā€œconstraintā€ ref=ā€œsecurityConstraintā€ />
Ā  <property name=ā€œpathSpecā€ value=ā€œ/ā€ />
</bean>

Or we encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default.

Affected configurations

Vulners
Node
org.apache.activemq\apacheMatchactivemq

8.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H

7.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%