2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-6524" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2015-08-24T14:59:13.213" ,
2024-11-23 01:05:45 +00:00
"lastModified" : "2024-11-21T02:35:09.457" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types."
} ,
{
"lang" : "es" ,
"value" : "La implementaci\u00f3n de LDAPLoginModule en el Java Authentication y Authorization Service (JAAS) en Apache ActiveMQ 5.x en versiones anteriores a 5.10.1 permite operadores comod\u00edn en nombres de usuario, lo que permite a atacantes remotos obtener credenciales a trav\u00e9s de un ataque de fuerza bruta. NOTA: este identificador fue SEPARADO de CVE-2014-3612 por ADT2 debido a diferentes tipos de vulnerabilidad."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-23 01:05:45 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-23 01:05:45 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-255"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "253C303A-E577-4488-93E6-68A8DD942C38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "436F59B9-507A-4B4E-A9F3-022616866151"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F58D9E69-CBF2-4FB6-B062-ED21F83CBCCB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "05D6EC30-88DC-4424-BF86-D9C0DA5E191C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "82ACD6BA-257F-49D0-8944-0991FB038533"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C43FD7A1-FC03-47BC-B6C6-02C0F1466762"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7A8D571-2925-4F61-B3F0-8F4A3776F6EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47B31CD9-A3BB-427C-A631-2E8168DD1985"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B904806-6796-4947-BDF4-EEA5681147E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "61B4A1EE-7F62-4602-A102-8AD8E9FD528F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6075BF1D-AC7C-46E3-A730-4E9A98856520"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "623530FC-12E9-480B-AFA0-C19FCFFA5D36"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5755A41-0DBE-4F54-A1C1-4F65DCC6ACD2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11AADFBF-AC60-4535-892C-BE90BE858172"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC5143E8-B392-4954-9C0D-DD39388B669F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4C0A644-8667-4ABD-8BB3-46289DCD3A93"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "607B6541-973A-4FF5-8106-A30076CA353C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08310F87-4C45-436F-A707-A22A4ACB1587"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4243B47C-26B9-45BE-B66A-F1534D18A265"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168651.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-11-23 01:05:45 +00:00
} ,
{
"url" : "http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168651.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}