Miggo Logo

CVE-2022-41678: Apache ActiveMQ Deserialization of Untrusted Data vulnerability

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.98534%
Published
11/28/2023
Updated
5/31/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.activemq:apache-activemqmaven< 5.16.65.16.6
org.apache.activemq:apache-activemqmaven>= 5.17.0, < 5.17.45.17.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability chain starts with handlePostRequest processing untrusted JSON to create JmxRequest objects. executeRequest propagates these requests to handlers like ExecHandler, which uses reflection in doHandleRequest to invoke dangerous MBean operations. The patch specifically restricts ExecHandler's capabilities by limiting allowed commands and blocking access to jdk.management.jfr.FlightRecorder MXBean, confirming these functions' role in the exploit.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

On** *n us*r is *ut**nti**t** on Joloki*, ** **n pot*nti*lly tri***r *r*itr*ry *o** *x**ution.  In **t*ils, in **tiv*MQ *on*i*ur*tions, j*tty *llows or*.joloki*.*ttp.***ntS*rvl*t to **n*l*r r*qu*st to /*pi/joloki* or*.joloki*.*ttp.*ttpR*qu*st**n*l*

Reasoning

T** vuln*r**ility ***in st*rts wit* `**n*l*PostR*qu*st` pro**ssin* untrust** JSON to *r**t* `JmxR*qu*st` o*j**ts. `*x**ut*R*qu*st` prop***t*s t**s* r*qu*sts to **n*l*rs lik* `*x****n*l*r`, w*i** us*s r**l**tion in `*o**n*l*R*qu*st` to invok* **n**rou