PT-2024-3291 · Apache · Apache Activemq
Martin Zeissig
·
Published
2024-04-11
·
Updated
2026-05-14
·
CVE-2024-32114
CVSS v3.1
8.8
High
| Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Apache ActiveMQ versions prior to 6.1.2
Description
The default configuration does not secure the API web context, which houses the Jolokia JMX REST API and the Message REST API. This allows unauthorized users to access these layers without authentication. Consequently, an attacker can interact with the broker via the Jolokia JMX REST API or use the Message REST API to produce, consume, purge, or delete messages and destinations. Real-world exploitation of this issue has been detected.
Recommendations
Upgrade to version 6.1.2.
As a temporary workaround, update the
conf/jetty.xml configuration file to add authentication requirements by configuring the securityConstraintMapping bean with the pathSpec variable set to '/'.Fix
Missing Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Apache Activemq