#VU50072 Improper Authentication in ActiveMQ and ActiveMQ Artemis


Published: 2021-01-27 | Updated: 2021-01-28

Vulnerability identifier: #VU50072

Vulnerability risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-26117

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
ActiveMQ
Server applications / Mail servers
ActiveMQ Artemis
Server applications / Other server solutions

Vendor: Apache Foundation

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to a logic error in ActiveMQ LDAP login module when configured to to use anonymous access to the LDAP server. A remote attacker can provide a valid username and no password and gain unauthorized access to the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

ActiveMQ: 5.16.0, 5.15.0 - 5.15.13

ActiveMQ Artemis: 1.0.0 - 2.15.0


External links
http://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e
http://issues.apache.org/jira/browse/AMQ-8035
http://issues.apache.org/jira/browse/ARTEMIS-2895


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability