Miggo Logo

CVE-2023-50780:
Apache ActiveMQ Artemis: Authenticated users could perform RCE via Jolokia MBeans

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.3882%
Published
10/14/2024
Updated
10/16/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.activemq:artemis-climaven< 2.29.02.29.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Apache ActiveMQ Artemis exposing the Log4j2 MBean (LoggerContextAdminMBean) through its Jolokia endpoint. This MBean provides methods to modify logging configurations (e.g., injecting malicious appenders). The fix in version 2.29.0 explicitly disables the MBean via the '-Dlog4j2.disableJmx=true' flag, confirming that the MBean's exposure was the root cause. While the vulnerable code resides in Log4j2, Artemis' insecure default configuration (lack of JMX disabling) enabled the attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** **tiv*MQ *rt*mis *llows ****ss to *i**nosti* in*orm*tion *n* *ontrols t*rou** M***ns, w*i** *r* *lso *xpos** t*rou** t** *ut**nti**t** Joloki* *n*point. ***or* v*rsion *.**.*, t*is *lso in*lu*** t** Lo**J* M***n. T*is M***n is not m**nt *or *x

Reasoning

T** vuln*r**ility st*ms *rom *p**** **tiv*MQ *rt*mis *xposin* t** Lo**j* M***n (Lo***r*ont*xt**minM***n) t*rou** its Joloki* *n*point. T*is M***n provi**s m*t*o*s to mo*i*y lo**in* *on*i*ur*tions (*.*., inj**tin* m*li*ious *pp*n**rs). T** *ix in v*rs