Description
The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3330-1 | activemq security update |
EUVD |
EUVD-2022-2892 | The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames. |
Github GHSA |
GHSA-72m6-23ff-7q26 | Improper Authentication in Apache WSS4J |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T10:50:17.971Z
Reserved: 2014-05-14T00:00:00.000Z
Link: CVE-2014-3612
No data.
Status : Deferred
Published: 2015-08-24T14:59:00.103
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-3612
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA