Default Configuration Flaw Exposes ActiveMQ Broker to Unauthorized Access
CVE-2024-32114

8.8HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
2 May 2024

Summary

In Apache ActiveMQ versions prior to 6.1.2, the default security configuration fails to secure key API endpoints, specifically the Jolokia JMX REST API and the Message REST API. This lack of authentication enables unauthorized users to access sensitive functionalities, allowing potential manipulation of the broker's operations, including message production, consumption, and destination deletion. To prevent unauthorized access, it is crucial to update the conf/jetty.xml configuration file to enforce authentication or upgrade to version 6.1.2 where security measures are implemented by default.

Affected Version(s)

Apache ActiveMQ 6.0.0 <= 6.1.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Martin Zeissig
.