### [CVE-2018-11775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11775) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20ActiveMQ&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Missing%20TLS%20Hostname%20Verification&color=brighgreen) ### Description TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html #### Github - https://github.com/Oferlis/risk-report