GHSA-crg9-44h2-xw35
Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.
Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://nvd.nist.gov/vuln/detail/CVE-2023-46604, https://github.com/apache/activemq/pull/1098, https://github.com/apache/activemq/commit/22442b2385b1000312aec3d19e510131d595a5fc, https://github.com/apache/activemq/commit/80089f9f476afab7d976f5fc37c5ab4aa0c2139d, https://github.com/apache/activemq/commit/958330df26cf3d5cdb63905dc2c6882e98781d8f, https://github.com/apache/activemq/commit/9905e2a5bf9862a049f94ce0a2465b0c7ad52436, https://github.com/apache/activemq/commit/d0ccdd31544ada83185554c87c7aa141064020f0, https://www.openwall.com/lists/oss-security/2023/10/27/5, https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-46604, https://security.netapp.com/advisory/ntap-20231110-0010, https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html, https://lists.debian.org/debian-lts-announce/2024/10/msg00027.html, https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html, https://issues.apache.org/jira/browse/AMQ-9370, https://github.com/apache/activemq, https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt, https://activemq.apache.org/security-advisories.data/CVE-2023-46604, http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html, http://seclists.org/fulldisclosure/2024/Apr/18, http://www.openwall.com/lists/oss-security/2023/10/27/5
