Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2400-1 activemq security update
Debian DLA Debian DLA DLA-3657-1 activemq security update
EUVD EUVD EUVD-2022-1253 Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
Github GHSA Github GHSA GHSA-xgrx-xpv2-6vp4 Improper Authentication in Apache ActiveMQ
Ubuntu USN Ubuntu USN USN-6910-1 Apache ActiveMQ vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T12:32:14.288Z

Reserved: 2020-06-08T00:00:00

Link: CVE-2020-13920

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-10T19:15:13.160

Modified: 2024-11-21T05:02:09.060

Link: CVE-2020-13920

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-10T00:00:00Z

Links: CVE-2020-13920 - Bugzilla

cve-icon OpenCVE Enrichment

No data.