cvelist/2022/41xxx/CVE-2022-41678.json
2024-02-16 14:00:36 +00:00

126 lines
5.7 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-41678",
"ASSIGNER": "security@apache.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.\u00a0\n\nIn details, in ActiveMQ configurations, jetty allows\norg.jolokia.http.AgentServlet to handler request to /api/jolokia\n\norg.jolokia.http.HttpRequestHandler#handlePostRequest is able to\ncreate JmxRequest through JSONObject. And calls to\norg.jolokia.http.HttpRequestHandler#executeRequest.\n\nInto deeper calling stacks,\norg.jolokia.handler.ExecHandler#doHandleRequest is able to invoke\nthrough refection.\n\nAnd then, RCE is able to be achieved via\njdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.\n\n1 Call newRecording.\n\n2 Call setConfiguration. And a webshell data hides in it.\n\n3 Call startRecording.\n\n4 Call copyTo method. The webshell will be written to a .jsp file.\n\nThe mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.\nA more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502 Deserialization of Untrusted Data",
"cweId": "CWE-502"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apache Software Foundation",
"product": {
"product_data": [
{
"product_name": "Apache ActiveMQ",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "5.16.6",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "5.17.4",
"status": "affected",
"version": "5.17.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "5.18.0"
},
{
"status": "unaffected",
"version": "6.0.0"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://activemq.apache.org/security-advisories.data/CVE-2022-41678-announcement.txt",
"refsource": "MISC",
"name": "https://activemq.apache.org/security-advisories.data/CVE-2022-41678-announcement.txt"
},
{
"url": "https://lists.apache.org/thread/7g17kwbtjl011mm4tr8bn1vnoq9wh4sl",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/7g17kwbtjl011mm4tr8bn1vnoq9wh4sl"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/28/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/11/28/1"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240216-0004/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20240216-0004/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"defect": [
"AMQ-9201"
],
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "wangxin@threatbook.cn"
},
{
"lang": "en",
"value": "wangzhendong@threatbook.cn"
},
{
"lang": "en",
"value": "honglonglong@threatbook.cn"
}
]
}