mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
160 lines
6.7 KiB
JSON
160 lines
6.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-46604",
|
|
"ASSIGNER": "security@apache.org",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Java OpenWire protocol marshaller is vulnerable to Remote Code \nExecution. This vulnerability may allow a remote attacker with network \naccess to either a Java-based OpenWire broker or client to run arbitrary\n shell commands by manipulating serialized class types in the OpenWire \nprotocol to cause either the client or the broker (respectively) to \ninstantiate any class on the classpath.\n\nUsers are recommended to upgrade\n both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 \nwhich fixes this issue.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-502 Deserialization of Untrusted Data",
|
|
"cweId": "CWE-502"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apache Software Foundation",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Apache ActiveMQ",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "5.18.0",
|
|
"version_value": "5.18.3"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "5.17.0",
|
|
"version_value": "5.17.6"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "5.16.0",
|
|
"version_value": "5.16.7"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "0",
|
|
"version_value": "5.15.16"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Apache ActiveMQ Legacy OpenWire Module",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "5.18.0",
|
|
"version_value": "5.18.3"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "5.17.0",
|
|
"version_value": "5.17.6"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "5.16.0",
|
|
"version_value": "5.16.7"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "5.8.0",
|
|
"version_value": "5.15.16"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt",
|
|
"refsource": "MISC",
|
|
"name": "https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt"
|
|
},
|
|
{
|
|
"url": "https://www.openwall.com/lists/oss-security/2023/10/27/5",
|
|
"refsource": "MISC",
|
|
"name": "https://www.openwall.com/lists/oss-security/2023/10/27/5"
|
|
},
|
|
{
|
|
"url": "https://security.netapp.com/advisory/ntap-20231110-0010/",
|
|
"refsource": "MISC",
|
|
"name": "https://security.netapp.com/advisory/ntap-20231110-0010/"
|
|
},
|
|
{
|
|
"url": "https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html",
|
|
"refsource": "MISC",
|
|
"name": "https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html"
|
|
},
|
|
{
|
|
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html",
|
|
"refsource": "MISC",
|
|
"name": "https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"defect": [
|
|
"AMQ-9370"
|
|
],
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "yejie@threatbook.cn"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 10,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |